Topic: Security

Got WiFi? User Expectations Drive New Challenges

Our wireless devices appear to be multiplying and our expectations for “anywhere, anytime access” are getting higher. As a result, state and local governments and universities are trying to cater to this demand by offering WiFi networks for their citizens or students. This brings to light some significant challenges. Read more…

5 Free Security Tools Every Cloud User Should Know About

When it comes to cloud, planning is everything. This is the case when it comes to every aspect of a cloud migration, and includes in no small measure security as well. However (surprisingly, given the importance of security in a cloud migration), sometimes … Read more…

Are You PCI-Ready for the Peak Holiday Shopping Season?

With Black Friday and Cyber Monday under our belts, it’s officially peak shopping season for millions of American consumers. Retailers will be working overtime to meet demand and earn much-needed revenue—but if they’re not careful, each credit card transaction they handle could expose both their customers and their business to risk. Read more…

The “Yes” Model: Five Tips for Keeping your Business Safe

We’ve recently covered the fundamentals of data security as well as commonly overlooked risks here on ThinkGig. Today we want to take a look at business strategies for establishing a culture that protects data and minimizes vulnerabilities. It’s what we like to call the “yes” model. Read more…

What is Enterprise Security?

While I know that some practitioners are going to scoff when I ask the question “What is enterprise security?,” I’m going to ask it anyway. You see, great leaps forward very often start with questioned assumptions. Ptolemy assumed (based on … Read more…

Beyond Viruses and Bots: Real Risks You Might Be Missing

We are all aware of the slew of network security issues facing organizations today. It seems like every other day there’s a new security breach in the news – take the recent hackers breaking into Sony’s PlayStation site and the Epsilon phishing campaign.

But while things like bots, viruses and hackers are well-known, we are starting to see less obvious risks come up that have a significant impact on an enterprise’s or a school’s information systems. Read more…

iPad 2: Should Businesses Really Care?

Should you care about the iPad 2? This time around, I’d wager the answer is probably yes. Why? Because this one is more business-friendly. It’s only a matter of time before business users are clamoring to get their IT departments to support the device. Read more…

Cloud Conundrum: Security

We all know that security is the No. 1 concern for enterprises considering cloud computing. Technology decision makers must balance risk management strategies with the high availability and performance of cloud-based resources. Read more…