Skip to main content

Tagged With "Security"

Topic

ECS Named to CRN Top 100 Security MSP in 2020

Art Post ·
FAIRFAX, Va. – March 16, 2019 – For the second year in a row, ECS , a leader in advanced technology, science, and engineering solutions, has been named to CRN’s Managed Service Provider (MSP) 500 list in the Security 100 category. CRN’s Security 100 list recognizes the top cybersecurity vendors across five critical market segments: Network Security Endpoint Security Security Information and Event Management (SIEM), Risk, and Threat Intelligence Web, Email, and Application Security Data...
Blog Post

MSP & MSSP Industry Notes for March 22nd, 2020

Art Post ·
MSP & MSSP Industry Notes Sponsored by Arcoa Group ARCOA Group is here to help you successfully manage your IT Asset Disposition process. We help you recover value from retired electronic equipment through responsible methods of reuse and recycling. We ensure proper handling of assets which may contain data, while being environment stewards for assets that have no reuse value and are headed for recycling. We’ve built a robust de-manufacturing process to offer additional options for asset...
Topic

ASC receives highest Security Certification for Information Technology from the US Department of ...

Art Post ·
ASC neo Recording has been JITC-certified Hösbach, April 28, 2020 – ASC Technologies AG announces that “ASC neo Recording” has been approved and certified by the Joint Interoperability Test Command (JITC). The integrated recording software thus complies with the strict security requirements of the United States Department of Defense (DoD) for information technology for military use. ASC neo Recording captures, saves, and archives all communication across all channels (fixed-line networks,...
Topic

ADDING MULTIMEDIA NTT and Tanium Announce Intent for Strategic Partnership to Deploy Security Solutions for the Smart World

Art Post ·
TOKYO--( BUSINESS WIRE )--NTT Corporation (“NTT”) and Tanium Inc. (“Tanium”) today announced their intention to enter into a strategic partnership to provide secure, highly reliable solutions for IT, IoT and OT environments to support Smart World deployments.* NTT and Tanium plan to offer their areas of expertise to provide near real-time visibility into computing devices, equipment and systems, as well as provide secure management solutions for Smart World deployments (Smart City, Smart...
Blog Post

This Week in the Copier Industry 10 Years Ago for the First Week of May 2010

Art Post ·
Years ago I use to burn the late night candle pretty often. In some cases I would still find myself emailing a prospect at 2AM in the morning. In most cases the email was to schedule a meeting for later that week. Those late night emails was just something I was use to. It wasn't until one of my clients made mention of the email that arrived at 2AM. Of course he didn't see it until he arrived at work. But this client went on to tell me that he wished he had more sales people like me, meaning...
Topic

Percona Launches New Open Source Security Tool, Database Distributions and Managed ...

Art Post ·
RALEIGH, N.C., May 19, 2020 (GLOBE NEWSWIRE) -- Percona , a leader in open source database software and services, today announced the launch of multiple database distributions and service offerings to help improve data management, availability, and security. This includes Managed Database Service provision for MongoDB and a new distribution for MongoDB, alongside an enhanced distribution for PostgreSQL. Another key launch from Percona is the latest version of Percona Monitoring and...
Reply

Re: Integrating Biscom Fax Server & Biscom Secure File Transfer Server at the MFD

Art Post ·
Whoa, that's a lot of technology! Wish you were on my team. Awesome stuff as always!
Reply

Re: Integrating Biscom Fax Server & Biscom Secure File Transfer Server at the MFD

VinceMcHugh ·
Art, We would make quite a team! Vince
Comment

Re: Email Security is Moving Into More Prominent Positions

HUNTER BUSINESS SYSTEMS ·
Art what time is good today I néed 20 m minutes steve Steve s iPhone > On Aug 4, 2014, at 4:54 PM, Print4Pay Hotel < alerts@hoop.la > wrote: >
Comment

Re: A Closer Look at Data Breach Avoidance & Response

tonyl ·
I am out of the office until 07/14/2014. I will respond to your message when I return. Note: This is an automated response to your message "Post By Art Post: A Closer Look at Data Breach Avoidance & Respo..." sent on 7/9/2014 9:07:01 AM. This is the only notification you will receive while this person is away.
Blog Post

Healthcare's Next Step with Secure Cloud Demands

David Bailey ·
Cloud computing has remained one of the most important trends to ever have surfaced in corporate IT, as it quickly overhauled the ways in which organizations provision, use, maintain and optimize their technological assets. Although cloud markets were first very heavy on software, the industry has evolved rapidly to offer infrastructure, platform and other options necessary to have a fully functional and optimally enabled IT department. Still, security has been a touchy subject for cloud...
Blog Post

Healthcare IT Security Onus Remains on Access Control

David Bailey ·
As major trends in corporate computing such as the Internet of Things, enterprise mobility, big data and telecommuting continue to intensify, security professionals have increasingly urged leaders to understand the importance of enhanced access control. Up until this point, simple passwords have been the most common means of authenticating users and allowing individuals to use and share sensitive corporate information through a range of platforms, websites and devices. However, the...
Blog Post

Data Analytics Raises Health Care IT Security Concerns

David Bailey ·
Health care providers have been somewhat under the gun when it comes to the integrity, security and privacy of patient data for more than a decade now, while breaches have increased in prevalence and damage. The onus has been decisively placed on individual medical firms to begin making more progressive changes to their IT security and general data management strategies, but the entirety of the sector is increasingly expected to invest more time and resources into these endeavors.
Topic

ansarada Announces New Secure Document Management Solution for Managing Microsoft® Office Files During M&A Due Diligence

Art Post ·
CHICAGO--( BUSINESS WIRE )-- ansarada , a global provider of virtual data rooms designed to simplify the mergers and acquisitions process, today introduced Secure Office, a new document review feature that allows bidders to open secure Microsoft® Office files in their native programs, rather than as read-only PDF or image files. With Secure Office, bidders can now manipulate documents, such as adjusting formulas to “stress-test” financial models in Excel, while the seller maintains strict...
Topic

Cicayda and Citrix Deliver Secure Document Management for Legal Market

Art Post ·
NASHVILLE, Tenn. , March 15, 2016 Cicayda today announced the Company is integrating its Reprise cloud e-discovery software with Citrix ShareFile, the leading secure file sharing and sync service. Cicayda's Reprise is a powerful, fast, cloud-based discovery review software, including advanced text analytics that is the choice of small and medium size law firms throughout the U.S. According to Billy Hyatt , Cicayda's CEO: "We are thrilled to be a part of the ShareFile family, and the...
Topic

iNetSec From PFU Systems, a Fujitsu Company, Sweeps Four Awards at 12th Annual 2016 Info Security Product Guide's Global Excellence Awards®

Art Post ·
SUNNYVALE, CA--(Marketwired - Mar 17, 2016) - PFU Systems, a Fujitsu company and award-winning provider of network access control and security technology, today announced that its iNetSec Smart Finder Network Access Controller was honored by Info Security Products Guide, a leading information security research and advisory guide, with four 2016 Global Excellence Awards®. The 12th Annual Global Excellence Awards ceremony kicked off the 2106 RSA Conference in San Francisco on February 29, and...
Blog Post

4 trends that heighten the need for stronger healthcare IT security

David Bailey (Guest) ·
IT security has been - and should be - the central focus for corporate decision-makers in virtually every segment of the private and public sectors today, as the rate of these events and the size of subsequent damages have both skyrocketed. Several...
Topic

New Canon Office Document Scanner Compatible with Document Management System

Art Post ·
For Immediate Release New Canon Office Document Scanner Compatible with Document Management System DocuWare Certifies Canon’s imageFORMULA DR-C240 Scanner New Windsor NY, July 6, 2015 – DocuWare, a leader in the ECM industry, has tested and certified the Canon imageFORMULA DR-C240 with the latest version of its software, DocuWare 6.7. The imageFORMULA DR-C240 scanner quickly and easily integrates into a DocuWare installation, allowing users to effortlessly turn paper documents into digital...
Topic

Managed Security Service Market Growth To Skyrocket

Art Post ·
Global Managed Security Services Market: Cloud-Based Services to Push Market Growth at 15.4% CAGR during 2013-2019 Managed security services or MSS are designed to manage an organization’s security needs. The services are conducted in-house or outsourced to a service provider. Managed security services monitor the intrusion detection systems and firewalls, perform security audits, oversee patch management, and respond to network emergencies. The growing demand for IT management from large as...
Blog Post

5 Steps Toward Stronger Email Security and HIPAA Compliance

David Bailey (Guest) ·
Email security has been a relatively major pain point for organizations across industries and sectors in the past few years, as this immensely popular communication medium tends to be an easy entry point for hackers and other threats. Unfortunately,...
Topic

Your Printer Just Got a Little More Secure

Art Post ·
Newswise — In 2011, a small group of university researchers working on securing embedded devices caught the attention of the Department of Homeland Security (DHS) Science and Technology Directorate (S&T). That effort has since evolved into a one-of-a-kind technology – called Symbiote – that Hewlett-Packard (HP) recently licensed from Red Balloon Security, to protect its printers from cyber attacks. The Symbiote technology will be integrated into HP’s LaserJet Enterprise printers and...
Blog Post

The Continuing Issue of Reactionary IT Security in Health Care

David Bailey ·
Health care providers have been hot and cold with respect to protecting patient data of late, as many have made progressive moves to protect their systems and information, while others have lagged behind in this regard. Although retailers and others...
Blog Post

Health Care Email Security Still Needs Improving

David Bailey ·
Despite the fact that so many data breaches have impacted the health care sector in the past few years, and a high percentage of them have been traced back to poor email security, it does not seem as though industry players are really rising to the...
Topic

InteliSecure Named Symantec's North American Managed Innovation Partner of the Year at 2015 Partner Engage Awards

Art Post ·
InteliSecure Named Symantec's North American Managed Innovation Partner of the Year at 2015 Partner Engage Awards DENVER, CO--(Marketwired - Dec 8, 2015) - InteliSecure , the leading managed security service provider (MSSP) delivering critical asset protection for enterprise organizations globally, today announced it has been recognized by Symantec Corporation as its North American Managed Innovation Partner of the Year. The honor was bestowed at Symantec's 2015 Partner Engage conference...
Topic

Global Managed Security Services (MSS) Market Will Grow from USD 17.79 Billion in 2015 to USD 35.53 Billion by 2020 - Research and Markets

Art Post ·
DUBLIN--( BUSINESS WIRE )-- Research and Markets ( http://www.researchandmarkets.com/research/psfn86/managed_security ) has announced the addition of the "Managed Security Services Market - Global Forecast to 2020" report to their offering. “Managed Security Services Market - Global Forecast to 2020” The Managed Security Services market size is expected to grow from USD 17.79 Billion in 2015 to USD 35.53 Billion by 2020, at an estimated CAGR of 14.8% during the forecast period. Major growth...
Blog Post

What Does Comprehensive Data Security Look Like?

David Bailey ·
Information security has become one of the most widely discussed topics among boardroom members, public sector officials and consumer advocates in the past few years, as identity theft has ravaged the U.S. economy. Although progress has been made in this regard, firms are still struggling to really strike the right chords with their security programs, and the biggest problem appears to be a lack of comprehension, leading to vulnerabilities that can be capitalized upon by threats. Hackers and...
Blog Post

IT Security, Compliance Become a Difficult Balancing Act

David Bailey ·
Organizations in health care and virtually every sector have been challenged significantly of late when it comes to protecting information from breach, exposure, theft and loss, as so many threats have emerged in such a small period of time. The cost of experiencing a major data breach is going up quickly as the years pass, and the rate of entities (healthcare providers) to not have been impacted by one of these events is falling fast as well. These are some of the many reasons why...
Blog Post

When Will the Breach Threat Subside?

David Bailey ·
In the past several years, the cybersecurity arena has been moving in the wrong direction, to say the least, and it does not really seem as though the story will change any time soon. Healthcare providers, retailers, payment processors, banks and government agencies have been frequently targeted by hackers of late, while insider threats and employee negligence have actually moved into the lead for the most common causes of data breach, and consumers are suffering as a result. Identity theft...
Blog Post

Is Healthcare Prepared for Internet of Things?

David Bailey ·
The Internet of Things has been among the more widely discussed and hyped trends in corporate computing throughout the past few years, and is only continuing to gain steam given the explosion of new devices entering the market. Considering the fact that health care firms have thus far struggled to get a handle on enterprise mobility, which only entails smartphones, tablets and portable computer, leaders need to begin planning for the IoT as soon as possible with a specific focus on security.
Topic

Fujitsu Introduces New Network Scanner Designed To Improve Business Processes And Maximize Efficiency

Art Post ·
SUNNYVALE, Calif. , July 21, 2015 /PRNewswire/ -- Fujitsu , the market leader in document imaging scanners, today introduced its latest network scanning solution -- the FUJITSU Network Scanner N7100. The new network scanner seamlessly integrates within a company's existing network infrastructure, allowing users to easily scan and share information on the network in order to streamline business operations, reduce operating costs and enhance work processes. The N7100 features increased...
Blog Post

New Survey Reveals Consistent Failures in Healthcare IT Security

David Bailey (Guest) ·
It might seem as though journalists and analysts have been beating a dead horse with the information on healthcare's severe IT security struggles, but awareness is critical in the fight against modern cybercrime. This is especially true given the...
Blog Post

The BYOD Side of Health Care IT Security

David Bailey ·
In the past several years, plenty of trends in corporate IT have taken shape and intensified, but perhaps none quite as impactful and challenging as enterprise mobility. Sure, the Internet of Things is beginning to scale up and challenge managers in the IT department, but it will take years for this trend to see the same types of gains in adoption as enterprise mobility and, specifically, BYOD, have seen of late. Lost or stolen devices, rogue IT, poor control over access, no governance and...
Topic

Canon Announces imageWARE Secure Audit Manager Express V2.1

Art Post ·
MELVILLE, N.Y., Apr 14, 2015 (BUSINESS WIRE) -- Canon U.S.A. Inc., a leader in digital imaging solutions, is pleased to announce the new imageWARE Secure Audit Manager (SAM) Express V2.1, a security software solution for audit purposes in the information security space. According to the International Data Corporation (IDC),1 80 percent of organizations expect to suffer at least one successful attack causing serious harm that requires remediation. IDC’s analysisalsofound the average total...
Blog Post

How can healthcare organizations choose and use email encryption?

Art Post ·
Email Encryption has become an important asset for healthcare organizations in a world where cybersecurity is a necessity. Although it doesn't seem like the most fancy or complex protection tool, it can be an amazing resource for email...
Blog Post

Healthcare organizations at risk of Shellshock vulnerability

Art Post ·
Security threats are growing in abundance as more health organizations choose to host large quantities of patients' personal and medical information in data centers, locally and across the country. A recent study from McAfee discovered over 31 million...
Blog Post

Cloud security considerations for healthcare organizations

Art Post ·
Cloud computing has numerous benefits for organizations in the healthcare industry, as many departments can find applications and data to host in the cloud environment, making resource provisioning easier and allowing employees to use less physical...
Topic

Top 5 Reasons Enterprises Deploy a Print Management Solution

Art Post ·
The Managed Print Services market is expected to grow to $12.3 billion (£7.4 billion) through 2018, up from $10 billion (£6.4 billion) last year . So who says print is dead? Achieving cost reductions used to be a main driver for deploying a print management solution. But pressure on IT to provide additional value from their existing multi-functional printer (MFP) fleet to meet changing business conditions have surfaced additional reasons for deploying a print management solution. SEE ALSO:...
Blog Post

Planning for the Future with DocuWare

DocuWare (Guest) ·
Planning for the Future with DocuWare   Third-party retirement plan administrator, ADMIN Partners is using DocuWare to transform their business processes from paper-based to completely digital workflows, increasing efficiency and transparency...
Blog Post

The Complexity is Real in Health Care Security

David Bailey (Guest) ·
The average organization, regardless of size or industry, is under a greater threat of data breach than ever before, as digital risks continue to propagate and the defenses to avoid them lag. As a result, the frequency and subsequent damages...
Blog Post

Email security has transcended into ridiculousness

David Bailey (Guest) ·
While it is never good to make light of a serious situation such as IT security, businesses as well as health care providers and government agencies have been making it quite difficult to keep a lid on hilarity. That was meant to evoke "Hillary," in...
Blog Post

Health Care Still Struggling with Email Security

Art Post ·
The health care sector has come under fire of late due to an increased prevalence of data breaches, privacy failures and more, while many of the more damaging events have actually been the result of relatively simple mistakes. Although the retail...
Topic

Security Solutions for Ambulatory

Art Post ·
Topic

EarthLink's New Managed Security Monitoring Service Helps Businesses Achieve Compliance Objectives and Defend Against Security Threats

Art Post ·
ATLANTA , Feb. 24, 2015 /PRNewswire/ -- EarthLink Holdings Corp. (NASDAQ: ELNK ), a leading managed network and cloud solutions provider for multi-location businesses, has unveiled a new Managed Security Monitoring Service designed to actively monitor customers' network, servers, routers, Point of Sale (POS) devices, laptops and desktops to detect security events before they turn into disruptive and costly data breaches. By partnering with EarthLink to develop a comprehensive Managed...
Topic

Auxilio, Inc. Announces Lead Sponsorship at HIMSS Privacy and Security Forum 2015

Art Post ·
Auxilio, Inc. (OTCQB: AUXO), a leading provider of IT Consulting and Managed Services for the healthcare industry, announced today a partnership with HIMSS Privacy and Security Forum as the lead sponsor. The forum will be held at Manchester Grand Hyatt on March 5-6th and will bring the best and brightest security experts together to share best practices and trends around protecting patient health information (PHI). Auxilio's CEO and President, Joseph J. Flynn says, "HIMSS is the go to source...
Blog Post

How dentists should comply with HIPAA

David Bailey (Guest) ·
Dentists should ensure their methods of HIPAA compliance are up to date. According to Dentistry IQ, all positions within the dental field have to know how to approach the legislation, including receptionists, assistants, dental hygienists and IT...
Blog Post

5 Internet and secure email tips

Art Post ·
Hillary Clinton has certainly been under fire in the news recently for her insecure email usage. However, there are many strategies businesses can teach their employees and learn from Clinton's mistakes to ensure safe technology use in the workplace....
Topic

IDEX Corporation Selects Secure-24 and GSI for JD Edwards Hosting and Management

Art Post ·
SOUTHFIELD, Mich., Nov. 24, 2014 /PRNewswire/ -- Secure-24, a leading provider of managed IT operations, application hosting and cloud services, and GSI, a full-service JD Edwards consulting and managed services organization, announced today that IDEX Corporation has selected them as its comprehensive JD Edwards IT outsourcing solution. IDEX is a diversified specialty manufacturing company that sells highly engineered products to customers in a variety of markets worldwide, including...
Blog Post

Two severe Windows vulnerabilities addressed, another two unpatched

Art Post ·
Windows users might have noticed that on the morning of Nov. 13, they were greeted with a large number of updates for their systems. This is all too common of a problem for IT departments as they scramble to patch servers, desktop computers and...
×
×
×
×
×