Disruptive technology: Trends gaining traction

disruptive Where would we be without computers, smartphones, music and video streaming? Likely, we’d still be using decade-old technologies like typewriters, landlines, CDs and DVDs. These newer products are prime examples of disruptive technology: exciting innovations that displace pre-established items, and drastically shake up the way we live, work, interact and communicate.

[Read more…]

Why the Shellshock Vulnerability Is A Perfect 10

Why the Shellshock Vulnerability Is A Perfect 10

Another big buzz in the media again. Looks like there has been another dangerous vulnerability identified and rated a 10 for impact, and a 10 for exploitability. This is the threat we now know as the Shellshock Vulnerability.

The major concern is that, if an attacker has the skill to craft a packet to take advantage of the vulnerability, they can inject code that compromises a target machine.

That seems simple enough – and from a conceptual perspective, it is. So why it is rated so high? And how does it compare to the Heartbleed bug we recently heard so much about?

[Read more…]

Are you protected from password security breaches?

password securityThere have been a lot of headlines in the news recently about password security breaches.

From “Russian Hackers Amass Over a Billion Internet Passwords” to “Stolen Passwords at Core of Breach”, or “New Vulnerabilities Expose User Passwords for Sites You Use.”, you should be alarmed. [Read more…]

CYOD: A New Way to Embrace Mobile Devices

CYOD: A New Way to Embrace Mobile Devices

The proliferation of personal mobile devices is changing the way we do business — and companies are either embracing it, or sticking with the status quo. But there is another option that’s gaining momentum.

On one end of the spectrum is COPE (company-issued, personally-enabled), where the organization chooses which devices employees use, and the company owns and pays for the device.

On the other end of the spectrum is BYOD (bring-your-own-device), where employees are allowed to use their personal mobile device for work, but they pay for it and typically support it themselves.

The company benefits from BYO by not having to purchase the devices. But, because IT no longer has control over which devices are being used on the network, corporate security measures are difficult to enforce. There are also issues around data ownership, data integrity and the management of alien devices in the corporate environment.

A third option strikes the balance between COPE and BYOD, and it’s gaining in popularity.

[Read more…]

How To Save 40 to 60% on Your IT Security Spend

How to Save 40 to 60% on Your I.T. Security Spend

“How would it impact your business if  you saved 40 to 60% on your overall security spend, and get better security?”

This is the question I ask clients most during consulting engagements. Typically there are a variety of responses that end with the question “how?”

[Read more…]

Mastering the BYOD Balancing Act: The Softchoice Journey

Balancing Act

It’s funny how things evolve so quickly. Just a few years ago, the thought of employees using their own phones or laptops for work at work was unthinkable.

But as the consumerization of IT trend grows from a trickle to a flood, many organizations have no choice but consider how to implement a Bring Your Own Device (BYOD) program. And the experience at Softchoice was no different.

[Read more…]