Data security: Lessons from the front lines of breach research

IBM Ponemon data security breach study Softchoice

Data security is a continuous battle against malicious forces—one in which the key to a successful strategy is information.

Dr. Larry Ponemon, the Chairman and Founder of the Ponemon Institute, has for more than a decade, been on the front lines of data security research.  His organization’s 2016 Cost of Data Breach Study: Global Analysis has telling intelligence for us to take to the trenches in our own fight against malware and privacy threats.

[Read more…]

6 Tips for Increasing the Portability of Your Hybrid Cloud Security Strategy

hybrid cloud security intel security

Security should be a high priority in any scenario, however, and strategies for hybrid cloud environments must take into account the potential for frequent movement of data between public clouds as well as between public and private clouds. Here are six factors to consider to ensure that your security strategy is portable across all services and service providers.

[Read more…]

How to Secure the Cloud with Symantec O3

How to Secure the Cloud with Symantec O3

A recent blog post by Softchoice security expert Stephen Perciballi outlines the challenges faced by organizations that use third-party services to store their data. He points out that while it’s not unusual for companies to spend thousands, or even millions of dollars securing their corporate data center, a single critical file saved by an employee to a less-than-secure consumer Cloud solution circumvents it all.

IT managers are well aware of this risk and worry about hackers getting hold of user login credentials, and the potential for viruses, Trojans and malware to infiltrate sensitive corporate information. In the worst-case scenario, these propagate right up to the server level in a DDoS attack – to bring it all down.

The fact is users enjoy the collaboration and productivity third-party Cloud SaaS apps provide. And all they need is a credit card to access an app like Yammer from the office, cottage, or coffee shop. This puts IT Managers in a bit of a quandary. Do they take the unpopular but safe approach and block Cloud SaaS apps altogether? And is that even possible? Or, do they accept these changing times – and a changing workforce – and work with users to make access to third party Cloud SaaS apps secure?

[Read more…]