General Computing Executive Commentary

  1. How CryptoLocker Has Been Good For The Industry

    Ian Trump is a fan of ransomware; not because of what it does but because of how it’s refocused our attention on security. Here he offers four quick wins that will help you build a hard-to-hack fortress.

  2. Productivity And Security Don’t Have To Be Inversely Proportional

    Conventional wisdom in the security industry says that as security is increased, productivity decreases proportionately. Everyone’s experienced it. Access to a certain application or server is denied unless the user is within the confines of the organization. Employees are required to log in to a virtual private network (VPN) when working remotely in order to access key corporate IT assets.

  3. How To Help Your Clients Prevent Shadow IT

    Shadow IT, information-technology systems and solutions built and used inside organizations without explicit organizational approval, can be lurking in any company’s infrastructure. In today’s modern cloud era with easy-to-leverage applications and devices, the IT department —or you, as an IT solutions provider — can very easily lose control.

  4. 4 Ways To Get The Most Out Of Big Data

    Big Data has become one of the most reliable tools for businesses to discover more about their audience, focus their marketing plans, and boost their sales. Although it’s a complicated process, once it’s understood and harnessed, the benefits are immediate and long lasting.

  5. 11 Ways The Channel Will Succeed With IoT — #11 May Surprise You

    Since my first presentation representing IBM on Pervasive Computing in 1995, I have had a keen interest on how the market would evolve. Using my trusty Wi-Fi-enabled toothbrush as a prop, I would try to paint a picture of a world with billions of devices and sensors changing our everyday lives, disrupting industries, and ushering in the end of client/server computing.

  6. The Difference Between Detecting A Potential Breach And Disclosing A Disaster

    As we approach the end of 2015, it’s time to look back at some of the biggest breaches that rocked the data security and prevention world and reflect on the lessons learned. As I started to think back on the top stories over the last year, the first one that comes to mind is from February, which detailed the U.S. State Department’s inability to control a data breach more than three months after its detection.

  7. 5 Key Qualities That SMBs Look For In An IT Solutions Provider

    It’s no secret that small to midsize businesses (SMBs) have fewer technology resources, staff, and funds than the larger companies they compete with on a daily basis. As a result, SMBs are often late to the game when new technologies arise that can help their businesses succeed. But there something that can give the SMB an edge over its rivals, and that’s the right IT solutions provider.

  8. What To Focus On After A Breach: Five Key Questions

    The Identity Theft Resource Center reports that as of late October, there have been 629 data breaches this year, exposing nearly 176 million records. That’s about two breaches per day, with many more attempted. A company’s data and reputation are at stake, and managed services providers (MSPs) and their customers may share that natural human desire to know who was responsible for a data breach.

  9. Top Reasons To Utilize Consultative Services In The Contact Center Space

    There is a longstanding joke in the telecommunication sector: A business owner will believe anything a technician says, as long as he is located 50 miles from the office. If you are in-house, no one listens.

  10. 7 Ways To Increase Your Customers’ Awareness Of Cybersecurity

    Moving at the speed of business today means providing immediate access to critical business data and applications, regardless of whether workers are on-site or working remotely. It also means enabling workers to respond quickly to customer and partner requests via e-mail and instant messaging, and leveraging cloud computing to support instant collaboration between workers, customers, and partners in different geographic locations.