SORT BY Relevancy
Our conversations are real and can take twists and turns resulting in perspective about Big Data you will never get from those ladder climbing professionals playing it safe. It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.
Joining us will be Randy Roberts, President of Digital Security Advisors. DSA provides expertise to understand, design and implement controls needed to provide a secure network. With global enterprise experience our team can help your organization design or redesign your network so that it actively assist your team secure your assets. We discuss Sony, Home Depot and JP Morgan Chase data breaches.
Connect with Randy: www.linkedin.com/in/rsroberts
Just in the last year alone, the world witnessed many unprecented, security breaches. Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot. Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'. No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.
One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie. In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.
4 Essential Pieces to Any Small Business BYOD Strategy
Believe it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please.
We’ve come a long way. Today, businesses really have no choice but to let employees use personal devices for work purposes. Blurred lines now make it difficult to differentiate between what is professional and what is personal. A company or organization may partially pay for an employee’s tablet computer or smartphone, but that same device is used to upload photos to Facebook or download torrents of this season of Game of Thrones.
Naturally, security and privacy issues are a concern since these devices synch to the company network. Larger corporations may be able to hire IT support or produce sophisticated BYOD guidelines for employees to adhere to but smaller businesses have limited resources.
3 Things to Consider Before Jumping Into BYOD
You’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner should recklessly jump right into BYOD just because everyone else is doing it. Data and network security concerns have to be thought out, defined, and addressed in a comprehensive BYOD policy. Here are three things to consider.
Why SMBs Must Proactively Address the Threat of Mobile Hacks
More cyber criminals are targeting small-to-medium sized businesses. One reason for this is too many workplaces have insufficient bring-your-own-device (BYOD) policies in place. Some have none at all. Although firms are generally more knowledgeable about network security risks than in years past, they still woefully underestimate the security vulnerabilities linked to mobile devices like smartphones and tablets.
This is a real cause for concern since data breaches have the ability to put many already financially challenged SMBs out of business.
If customer/client data has been breached, there could be potential litigation costs, and naturally, lost goodwill and an irreparable hit to brand or company reputation. In part 2, we will discuss why this is a must!
A Smarter Approach to Mobile Device Management
More people today use personal mobile devices like smartphones and tablets for business purposes. Such devices, coupled with greater Wi-Fi accessibility and cloud services, have empowered us with the ability to access data and do business from practically anywhere at anytime.
Needless to say, many small-to-medium sized business owners have embraced the BYOD (Bring-Your-Own-Device) revolution. The benefits are obvious; increased employee productivity, enhanced services to customers/clients, and better overall customer and employee satisfaction.
But what about the potential consequences associated with this mobility revolution? Are small business owners doing enough preemptive planning to address potential risks that could arise with the use of BYOD devices?
As your big data initiative scales toward even bigger data, the odds are that the cloud will play a critical role in your strategy, whether for storage or as the home for your analytics applications. How can you trust the cloud to keep your data secure and to protect the privacy of your customers and partners?
Trust in the cloud has been growing as the concept has evolved, but cloud-based providers and your own organization can do more to ensure that the cloud is a secure environment for your data. Some of that work is being done by the Big Data Working Group of the Cloud Security Alliance.
Working group co-chair Wilco Van Ginkel, who is security strategist for Verizon Enterprise, joins All Analytics Radio to discuss the efforts to identify scalable techniques for data-centric security and privacy problems. The working group's goal is to crystallize best practices for security and privacy in big data, and to help industry and government organizations coordinate the development of big data security and privacy standards.
Van Ginkel will be available to address your questions and concerns and share his advice on building out a secure big data strategy in the cloud.
In this event you will learn:
About the progress that the cloud sector and its customers have made in building a secure environment
About some of the best practices for enterprises that the Cloud Security Alliance has already identified
What types of big data applications are ready for everyday life in the cloud
How security and privacy protections in the cloud environment may evolve in the year or so to come
Join the All Analytics community on Thursday, February 26, at 2 pm (ET), and bring your questions for Wilco Van Ginkel.
In July 2010, Microsoft transitioned from providing mainstream support for Windows Server 2003 to releasing critical patches only. July 14, 2015 marks another transition, this time the end of Microsoft support for Windows Server 2003/R2.
While this date may seem distant, now is the time to understand that the end of support and the end of life of Windows Server 2003 means that your business needs to ensure that it has a plan to migrate the applications and workloads currently relying on Windows Server 2003 onto Windows Server 2012 R2 or Microsoft Azure.
Just to be clear, End-of-Support for Windows Server 2003 means:
NO UPDATES Will be developed or released after the end of support
NO COMPLIANCE (HIPAA, PCI, SOX, etc.) which speaks for itself
NO SAFE HAVEN as both physical & virtualized environments affected
If you're still using Windows Server 2003, you to start your planning to migrate off of Windows Server 2003 and onto a platform that will provide you the security and reliability that you’ve experienced over the last decade with Windows Server 2003, with the added value of the features now included in Windows Server 2012 R2, as well as the hybrid opportunities available to you with Microsoft Azure.
Delaying will only create additional expenses, and ‘rigging’ your environments to detect intrusion, inclusion of more advanced firewalls, network segmentation, and so on, to simply isolate Windows Server 2003 servers will only result in a datacenter that costs more, and is still out of compliance, and out of date. Not to mention the maintenance costs for aging hardware… you’re just delaying your opportunity to transform.
If You Plan To Stay With Microsoft What Should You Do Now? We'll discuss that in this series.
Remember… Always Practice Safe BYOD
No matter what blog or magazine read these days, it seems like everyone is talking about today’s increasingly mobile workforce and the BYOD (Bring-Your-Own-Device) movement.
We live in an exciting time when work can be done at any time from any place. Employees love the fact that they can get work done on their iPad as they sit poolside sipping a Pina Colada. Businesses love the cost savings along with the happier and more productive employees they’re noticing. Meanwhile, customers and clients take note that their emails are commonly answered outside traditional work hours with a “Sent from my iPhone” tagline at the bottom.
Like anything related to business technology, there are naysayers who are quick to warn that a more mobile and dispersed workforce also means increased security risks.
Do they have a point? I'll cover that today!
COSN on STUDENT DATA PRIVACY
“Our guests today are Keith Krueger, CEO of CoSN (the Consortium for School Networking), and Aimee Rogstad Guidera, President and CEO of the Data Quality Campaign. Both are with us today from Austin, the site of SXSWedu, to discuss a major national announcement they are leading on student privacy.”
www.cosn.org @cosn @eddatacampaign
Presented by LIGHTSPEED SYSTEMS
My conversations are authentic and take twists and turns resulting in raw perspectives about Big Data. You will not get these from the playing it safe and not willing to speak candidly Data Executives. It's a weekly 30 minute show, completely uncensored on Big Data created by Bryan Wempen. No filters. Listen to the show every Tuesday, 9am/Central Time.
Joining us will be Chris Havrilla, Senior Director, HR Technology & Analytics at ADP. Chris has a unique combination of experience in the Recruiting, HR, Information Technology, and Professional Services fields that she leverages to do projects related to Talent Acquisition Strategy Development/Implementation; Full Life Cycle Recruiting; Sourcing; Technology, Tools, Systems; Social Recruiting / Social Media Strategy and Implementation; Candidate Assessments; Interviewing; Executive Search; Staffing Business Models, Processes; Training; Consulting; Human Capital; etc. As a Consultant, she have had clients ranging from SMB markets to the Fortune 100.
Connect with Chris:
Greg Gardner of NetApp shares the challenges that the DoD and Intel space face when choosing to move to the cloud. With limited budgets, cloud options can be enticing, but securing the massive amounts of data these agencies collect must be kept top of mind.
Join Host Live Chats
- Hagmann and Hagmann Report (419 chatters)
- Talk Real Solutions (35 chatters)
- thelordshour (27 chatters)
- Curious Times (18 chatters)
- Alan Roger Currie (15 chatters)
- The Pet Psychic (15 chatters)
- Nite Callers Bigfoot Radio (14 chatters)
- Healing Light Radio (12 chatters)
- HOV Radio (10 chatters)
- Debate Talk 4 U (8 chatters)
- Ra Sekhi Radio (8 chatters)
- Phone Fantasy Radio (7 chatters)
- SURN Host (7 chatters)
- drkate (7 chatters)
- Universal Radio (7 chatters)
- Elovation Radio (5 chatters)
- The Watchman Is216 (5 chatters)
- The Rad Reality Show (4 chatters)
- Ascended Masters and Angels (4 chatters)
- FIREFOXNEWS ONLINE (4 chatters)
- Evelyn Derry Ministries (3 chatters)
- Dead Air Paranormal Radio (3 chatters)
- LetsGoKings (3 chatters)
- Love Productions (3 chatters)
- World Alliance Radio Network (3 chatters)
- The Lotus Place (3 chatters)
- Soul Tree Radio X In The Raw (2 chatters)
- Sports Smack Down Network (2 chatters)
- SupaFi64 (2 chatters)
- The World Transformed (2 chatters)
- God In The Midst (2 chatters)
- The Crystal Show (2 chatters)
- The Lisa Affect (2 chatters)
- Ed Boston Podcast (2 chatters)
- Fellowship of Deliverance (2 chatters)
- FreedomizerRadio (1 chatters)
- LETS TALK URBAN (1 chatters)
- Hot Topics Talk Radio (1 chatters)
- Brain Injury Radio (1 chatters)
- Mets Public Record (1 chatters)
- prf88 (1 chatters)
- EnlightenmentEvolution Network (0 chatters)