The Best IT Blogs: 6-25-14 Weekly Roundup

IT blogs

Today, for almost every decision we make, from choosing a car to choosing a home, safety and security is always one of the most important considerations. The same goes for businesses navigating the cyber world. This week’s roundup proves that keeping data protected from intruders should be your company’s first priority. Here’s why: The New York Times recently published an article on how hackers are getting smarter by the minute. A new strategy, ransomware, essentially steals your data and holds it hostage until a fee is paid. But ways to fight back (without illegally entering another network) can save your business time and money. Options like using tags to monitor valuable information or im … Read more

Why The Cloud Is A Safe Deposit Box For Your Data

Having trouble wrapping your head around the cloud? Think of it as a safe deposit box for your data!

Skeptical about storing your data in the cloud? If so, you’re not alone. The very term “cloud” seems nebulous … it’s hard to wrap your brain around. To make the cloud more tangible, think of it as a safe deposit locker for your data, using these six key points as a reference: Security Imagine for a moment that you have some very expensive jewelry you want to protect. You could keep it at home, install a state-of-the-art security system, and hire the services of a night watchman. But, despite all your precautions, you still might have security gaps (just think of all the people who go in and out of your home, and how many entrances and exits there are). Alternatively, you could take your jew … Read more

How To Navigate The Minefield Of Cloud-Based Computing

cloud-based computing

The cloud is like the shiny “new” toy of IT – everyone’s talking about it. But there are still a lot of unknowns regarding cloud-based computing, making it a veritable minefield for those looking to get involved. Fortunately, it’s completely possible to march onward through the minefield without blowing up your infrastructure. Knowledge is power, after all. Studies have shown that more and more companies are embracing cloud computing. In fact, according to a study by TheInfoPro published in September, the worldwide cloud computing market is expected to grow at a compound annual growth rate of 36% through 2016. Organizations are recognizing the many benefits of cloud-based computing, as evid … Read more

Five Steps To Creating And Maintaining Cloud Security

cloud security

Hot trends have a way of making us re-evaluate our choices, especially if they stick around for a good chunk of time. The cloud is one trend that’s here to stay. With the increased use of mobile devices for business-related purposes, and the fact that more and more organizations are relying on applications and services from around the world, the cloud has become increasingly important. Some might even argue it’s vital for success in today’s world of modern technology. When organizations make use of the cloud, they tap into a range of benefits. Not only can they make data available to a global audience, but they gain additional data capacity without spending money on building out their infra … Read more

CardioComm Solutions Taps a Reliable Cloud to Keep Hearts Healthy

reliable cloud

Four years ago, my dad celebrated his 80th birthday by keeping a secret: his heart was about to give out, but he didn’t know what to do – or how to prepare his family. A child of the depression, his father was a roughneck in the post-Spindletop Texas oil patch, and his mother ran a boarding house to help make ends meet. He was raised to tough it out, keep his chin up and press on without complaining. Two weeks later, he was in the operating room having a quadruple bypass. I never thought he would survive the operation, but after a tense week in the ICU and a few days slowly responding to physical therapy, he came home – frail and weak, but very much on the mend. Our family was ill prepa … Read more

Social Solutions Uses Secure Cloud Computing to Accelerate Public Sector Growth

secure cloud computing

Back at the turn of the century, a small team of social workers in Baltimore, Maryland got together to help at-risk youth in their community. Their work was meaningful, and they felt they were helping their clients have a better life. But like many other human service professionals, they constantly wondered: How do we know if our efforts are making a difference in the lives of the individuals we serve? To answer that question, they formed a small company – Social Solutions – and developed a non-profit software solution that made it possible to correlate their service delivery efforts with the desired outcomes. They called the software "Efforts to Outcomes Software" or ETO Software®. A B … Read more

Be Sure #BYOD Doesn’t Spell Bring Your Own Disaster

BYOD

By JP Blaho The increased availability of powerful ultrabooks, smartphones, and tablets is blurring work and home life for many users. And most users don’t want to maintain two sets of contacts, calendars, and files, or lug around two devices when one would do. Many companies are adopting a Bring Your Own Device (BYOD) approach where workers can use their own devices to access company resources such as email, files, applications, and databases. To put the BYOD movement into perspective, consider that a recent industry study found that 44 percent of firms had a BYOD policy in place in early 2012, and that number increased to 94 percent in 2013. There are several reasons for this rapid e … Read more

Enterprise-level Security at a Small Business Budget

Cloud Security

By JP Blaho As companies embrace the fact that every business is a contender on the Internet, and every company is subject to the same types of vulnerabilities and attacks, they must all realize their network security postures must be advanced and robust.  This means that a company of six employees must have network security protections which mirror those of an organization of 6,000 employees.  As cost-prohibitive as it sounds, there are ways that non-enterprise-level businesses can implement a security strategy that is comprehensive and effective in protecting themselves from attack just as successfully as enterprise customers. One such solution is called Unified Threat Management ( … Read more