Refreshingly smart
How Out-of-Band remote console management technologies can improve the network refresh process and network availability
|
 |
It’s the data, stupid!
Why the most effective way to keep information secure must centre on protecting the data, not the endpoints using it |  |
Endpoint backup
A good endpoint defence is the best offence according to Andy Hardy at Code42
|
 |
Healthcare in the cloud
From big data to wearable devices, what are the key drivers – and top tips - for cloud adoption in the health sector?
|
|
Network Computing Awards 2015
This year’s Network Computing Awards took place on March 19th at the Hotel Russell in London. Here we profile some of the 2015 winners:
|
|
|
|
|
Comment
Welcome to the August 2015 Newsletter.
We’ve gone somewhat on the defensive this month with several articles looking at the best way to protect our network resources. Where should we draw the line when it comes to security? Does it begin with the network endpoints themselves, or should we really be concentrating on securing the data they are using?
According to Salo Fajer, CTO at Digital Guardian, “…Rather than trying to keep up with every new endpoint vulnerability and security leak, it is better to focus on protecting what the criminals want,” namely our data. Fajer advocates applying security policies directly to the data itself and not the endpoint. For Andy Hardy, EMEA MD at Code42, “Security must be continuous, not an occasional audit. Automated, consistent backup is crucial to protect data on both the endpoint device and in the cloud. Businesses also need to be in full control of this data, especially in light of the recent data sovereignty debate in Europe.”
A large part of achieving this will rely on training, and it seems we could all do with some help there judging by the results of a new phish’d by MWR survey carried out at InfoSecurity Europe. The survey found that, while 80 percent of people questioned had a policy in place for reporting phishing emails to the IT security department of their organisation, only 25 percent actually did so. As the survey illustrates, even the most sophisticated security policies won’t protect us if users fail to implement them correctly due to a lack of training or guidance.
Follow us :
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
|
|