Topic: Security

TG_TransformDT_Blog_900x310

Don’t Touch That Dial! Transform Your Infrastructure

Any fan of late night TV is surely familiar with the infommercial. These programs are everywhere touting the latest gadget or gizmo. “Don’t touch that dial!” announcers proclaim. Following simple steps, any viewer is sure to transform their lives with … Read more…

top10_blog

Looking Back: The Best of 2016

As we close out another year, it’s time to look back at some of our most popular blogs of 2016. During this time, we explored a broad range of issues facing enterprises during the burgeoning Digital Transformation. With topics ranging … Read more…

tg_cybersecurity_safety_net_blog

Your Cybersecurity Safety Net: CenturyLink® Managed Security Services

To boost chances of success, high risk situations often require an effective safety net. This additional protection makes it possible to direct attention towards more strategic initiatives. And with industry experts predicting 1 million new malware threats daily and a … Read more…

tg_mahon3_blog

The CISO and Supply Chain Defense

Your supply chain may expose your organization to cybersecurity risks. This article looks at the nature of these risks and offers some suggestions to mitigate them. First, to talk about cybersecurity and supply chains, a definition of the supply chain … Read more…

featured_blog_iot

DDoS + IoT = Cybersecurity Danger

In this age of connected devices – where everything from cars to coffee pots are going digital – it’s become a matter-of-course to be concerned with security. Analysts estimate there will be more than 200 billion smart wireless devices before … Read more…

tg_cs_protection_blog

Cybersecurity: Is Prevention Enough?

Consider the following dilemma: Cybersecurity experts maintain that you can’t prevent everything – so don’t try. However, many security programs devise countermeasures mostly geared toward prevention. This does not make sense.  If prevention is not 100% effective, then trying to … Read more…

govt_sec_blog_image

Cybersecurity Challenges in State and Local Governments

There’s an old proverb that says a chain is only as strong as its weakest link. Imagine a metal chain pulled from end-to-end. If each link can sustain a significant force, then the entire group is strong. But if just … Read more…

cyber_security_blog_image

Moving to a More Efficient Cybersecurity Strategy

CenturyLink helps hundreds of businesses and government agencies manage their cybersecurity programs. In the process, we have noticed a consistent theme: Even well-trained, thoughtful security professionals can occasionally miss the big picture. In particular, there can be an instinct to … Read more…