data security
Commitment to Cisco Customers Means Taking Data Privacy Seriously
3 min read
In the “old days,” security and data protection responsibilities generally rested solely within organizations’ IT teams. Today, nearly 17,000 devices are added to the Internet every minute, expanding the number of targets attackers can exploit to steal valuable data. Now, in addition to IT teams, business leaders and governments around the globe must dive deep […]
Pros and Cons: Do-It-Yourself Approaches to Monitoring Shadow IT & Cloud Services
2 min read
Shadow IT is estimated to be 20-40 percent beyond the traditional IT budget. The ease by which organizations can purchase apps and services from cloud service providers (CSP) contributes significantly to this spending. This is an eye-catching number worthy of investigation—not only to identify and reduce costs, but to discover business risks. So, it is […]
Partner Voices: Cloud, Data Security, and Business Continuity with Cisco Cloud-Powered Solutions from TekLinks
3 min read
With all of the malware attacks in the world today, sometimes Mother Nature is still the biggest threat to data security. When a deadly tornado outbreak in April 2011 occurred, Peoples Bank of Cullman, AL, experienced firsthand how important it is to have a backup data center location for their core infrastructure.
Securing Mobile Data in the Event of Device Loss or Theft
4 min read
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, […]
Summary: Mitigating Business Risks
1 min read
Organizations are rapidly moving critical data into the cloud, yet they still have serious concerns about security and other business risks. Read Bob Dimicco’s blog to learn several important steps companies can take to mitigate the risks of cloud services, such as uncovering shadow IT, assessing data security, and instituting cloud-specific employee policies.
Securing Mobile Data: What’s Your Plan?
1 min read
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world. This blog series, […]
Emerging Cloud Models: Community Cloud
2 min read
There is no disputing that both enterprises and service providers are embracing cloud. What’s different today is that not only are telcos cloud providers, but enterprises and governments are also becoming cloud providers through a community cloud model. A community cloud model is a collaborative effort where infrastructure is shared and jointly accessed by several […]
How Anyone in Any Industry Can Get Started in Cloud
3 min read
In today’s business landscape, cloud adoption and deployment is more than just a technical discussion. It’s really a choice about how to operate your business, regardless of what industry or vertical your organization is affiliated with. However, as a former CIO, I understand that many CIOs are more concerned with the challenges they face when […]
Bring Your Own Service: Why It Needs to be on InfoSec’s Radar
4 min read
Security concerns around cloud adoption can keep many IT and business leaders up at night. This blog series examines how organizations can take control of their cloud strategies. The first blog of this series discussing the role of data security in the cloud can be found here. The second blog of this series highlighting drivers […]