• 00:41

    Do The Thoughts Of Security Breaches Keep You Up At Night?

    in Technology

     


    Just in the last year alone, the world witnessed many unprecented, security breaches.  Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot.  Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'.  No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.


    One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie.  In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.


     

  • 00:14

    Embracing The Age of Mobility - Part 6 of 6

    in Technology

    4 Essential Pieces to Any Small Business BYOD Strategy


    Believe it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please.


    We’ve come a long way. Today, businesses really have no choice but to let employees use personal devices for work purposes. Blurred lines now make it difficult to differentiate between what is professional and what is personal. A company or organization may partially pay for an employee’s tablet computer or smartphone, but that same device is used to upload photos to Facebook or download torrents of this season of Game of Thrones.


    Naturally, security and privacy issues are a concern since these devices synch to the company network. Larger corporations may be able to hire IT support or produce sophisticated BYOD guidelines for employees to adhere to but smaller businesses have limited resources.

  • 00:30

    Embracing The Age of Mobility - Part 4 of 6

    in Technology

    3 Things to Consider Before Jumping Into BYOD


    You’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner should recklessly jump right into BYOD just because everyone else is doing it. Data and network security concerns have to be thought out, defined, and addressed in a comprehensive BYOD policy. Here are three things to consider.

  • 00:30

    Embracing The Age of Mobility - Part 2 of 6

    in Technology

    Why SMBs Must Proactively Address the Threat of Mobile Hacks


    More cyber criminals are targeting small-to-medium sized businesses.  One reason for this is too many workplaces have insufficient bring-your-own-device (BYOD) policies in place.  Some have none at all. Although firms are generally more knowledgeable about network security risks than in years past, they still woefully underestimate the security vulnerabilities linked to mobile devices like smartphones and tablets.


    This is a real cause for concern since data breaches have the ability to put many already financially challenged SMBs out of business.


    If customer/client data has been breached, there could be potential litigation costs, and naturally, lost goodwill and an irreparable hit to brand or company reputation. In part 2, we will discuss why this is a must!

  • 00:30

    Embracing The Age of Mobility - Part 5 of 6

    in Technology

    A Smarter Approach to Mobile Device Management


    More people today use personal mobile devices like smartphones and tablets for business purposes. Such devices, coupled with greater Wi-Fi accessibility and cloud services, have empowered us with the ability to access data and do business from practically anywhere at anytime.


    Needless to say, many small-to-medium sized business owners have embraced the BYOD (Bring-Your-Own-Device) revolution. The benefits are obvious; increased employee productivity, enhanced services to customers/clients, and better overall customer and employee satisfaction.


    But what about the potential consequences associated with this mobility revolution? Are small business owners doing enough preemptive planning to address potential risks that could arise with the use of BYOD devices?

  • 00:35

    Secure Your Big Data in the Cloud

    in Technology

    As your big data initiative scales toward even bigger data, the odds are that the cloud will play a critical role in your strategy, whether for storage or as the home for your analytics applications. How can you trust the cloud to keep your data secure and to protect the privacy of your customers and partners?


    Trust in the cloud has been growing as the concept has evolved, but cloud-based providers and your own organization can do more to ensure that the cloud is a secure environment for your data. Some of that work is being done by the Big Data Working Group of the Cloud Security Alliance.


    Working group co-chair Wilco Van Ginkel, who is security strategist for Verizon Enterprise, joins All Analytics Radio to discuss the efforts to identify scalable techniques for data-centric security and privacy problems. The working group's goal is to crystallize best practices for security and privacy in big data, and to help industry and government organizations coordinate the development of big data security and privacy standards.


    Van Ginkel will be available to address your questions and concerns and share his advice on building out a secure big data strategy in the cloud.


    In this event you will learn:



    About the progress that the cloud sector and its customers have made in building a secure environment
    About some of the best practices for enterprises that the Cloud Security Alliance has already identified
    What types of big data applications are ready for everyday life in the cloud
    How security and privacy protections in the cloud environment may evolve in the year or so to come


    Join the All Analytics community on Thursday, February 26, at 2 pm (ET), and bring your questions for Wilco Van Ginkel.

  • 00:30

    Windows Server 2003 End Of Support Is This July. Are You Ready?

    in Technology

    In July 2010, Microsoft transitioned from providing mainstream support for Windows Server 2003 to releasing critical patches only. July 14, 2015 marks another transition, this time the end of Microsoft support for Windows Server 2003/R2.


    While this date may seem distant, now is the time to understand that the end of support and the end of life of Windows Server 2003 means that your business needs to ensure that it has a plan to migrate the applications and workloads currently relying on Windows Server 2003 onto Windows Server 2012 R2 or Microsoft Azure.


    Just to be clear, End-of-Support for Windows Server 2003 means:



    NO UPDATES Will be developed or released after the end of support
    NO COMPLIANCE (HIPAA, PCI, SOX, etc.) which speaks for itself
    NO SAFE HAVEN as both physical & virtualized environments affected


    If you're still using Windows Server 2003, you to start your planning to migrate off of Windows Server 2003 and onto a platform that will provide you the security and reliability that you’ve experienced over the last decade with Windows Server 2003, with the added value of the features now included in Windows Server 2012 R2, as well as the hybrid opportunities available to you with Microsoft Azure.


    Delaying will only create additional expenses, and ‘rigging’ your environments to detect intrusion, inclusion of more advanced firewalls, network segmentation, and so on, to simply isolate Windows Server 2003 servers will only result in a datacenter that costs more, and is still out of compliance, and out of date. Not to mention the maintenance costs for aging hardware… you’re just delaying your opportunity to transform.


    If You Plan To Stay With Microsoft What Should You Do Now? We'll discuss that in this series.

  • 00:30

    Embracing The Age of Mobility - Part 3 of 6

    in Technology

    Remember… Always Practice Safe BYOD


    No matter what blog or magazine read these days, it seems like everyone is talking about today’s increasingly mobile workforce and the BYOD (Bring-Your-Own-Device) movement.


    We live in an exciting time when work can be done at any time from any place. Employees love the fact that they can get work done on their iPad as they sit poolside sipping a Pina Colada. Businesses love the cost savings along with the happier and more productive employees they’re noticing. Meanwhile, customers and clients take note that their emails are commonly answered outside traditional work hours with a “Sent from my iPhone” tagline at the bottom.


    Like anything related to business technology, there are naysayers who are quick to warn that a more mobile and dispersed workforce also means increased security risks.


    Do they have a point? I'll cover that today!

  • 00:42

    COSN on STUDENT DATA PRIVACY

    in Education

    COSN on STUDENT DATA PRIVACY


    “Our guests today are Keith Krueger, CEO of CoSN (the Consortium for School Networking), and Aimee Rogstad Guidera, President and CEO of the Data Quality Campaign. Both are with us today from Austin, the site of SXSWedu, to discuss a major national announcement they are leading on student privacy.”


    www.cosn.org  @cosn  @eddatacampaign


    Presented by LIGHTSPEED SYSTEMS


    www.lightspeedsystems.com  @lightspeedsys

  • 00:30

    Chris Havrilla talks Data Reality on Thug Metrics: Hosted by Bryan Wempen

    in Technology

    My conversations are authentic and take twists and turns resulting in raw perspectives about Big Data. You will not get these from the playing it safe and not willing to speak candidly Data Executives.  It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.


    Joining us will be Chris Havrilla, Senior Director, HR Technology & Analytics at ADP.  Chris has a unique combination of experience in the Recruiting, HR, Information Technology, and Professional Services fields that she leverages to do projects related to Talent Acquisition Strategy Development/Implementation; Full Life Cycle Recruiting; Sourcing; Technology, Tools, Systems; Social Recruiting / Social Media Strategy and Implementation; Candidate Assessments; Interviewing; Executive Search; Staffing Business Models, Processes; Training; Consulting; Human Capital; etc. As a Consultant, she have had clients ranging from SMB markets to the Fortune 100. 


    Connect with Chris:  
    Linkedin



    www.linkedin.com/in/chrishavrilla


    Twitter



    havrilla


     

  • 00:12

    Big Data and Security Considerations for Agencies Choosing Cloud

    in Technology

    Greg Gardner of NetApp shares the challenges that the DoD and Intel space face when choosing to move to the cloud. With limited budgets, cloud options can be enticing, but securing the massive amounts of data these agencies collect must be kept top of mind.

Join Host Live Chats