General Computing Executive Commentary

  1. 4 Ways Integrators Can Help Schools Increase Security Awareness
    10/7/2016

    Educational facilities must strike a balance between a combination of policies and technology solutions to achieve a welcoming, yet secure environment. As demonstrated by recent events, threats to the safety of students are significant, and schools can no longer afford a passive approach when addressing these threats. By Steve Birkmeier, Arteco Global

  2. 4 Ways To Keep Your Business Safe From The Rising Threat Of Ransomware
    10/6/2016

    A recent, high-profile incident in which a Hollywood-based hospital suffered through a ransomware lockdown is just the latest in a long string of public attacks that threaten the way we do business today. By Farokh Karani, Director, North America — Sales & Channels, Quick Heal Technologies

  3. Women In The Channel: How’s That Working For Them?
    10/6/2016

    I started in the channel 30 years ago, working for a Novell and IBM VAR followed by a stint for Novell Platinum Partner, LANSystems. By Dede Haas, CA-AM, Channel Sales Strategist, Practitioner, & Coach, DLH Services, LLC

  4. How To Add Security To Your Offering
    10/5/2016

    We can’t help but get numb to the number of security attacks in the news over the past few months with Large Enterprises making for a particularly attractive target. However, you’re just as vulnerable and more likely to get hit when you’re a small business. By Mauricio Bayon, president, Bayon Technologies Group and ASCII Group Member Since 2016

  5. Shared Service Management Required In The Era Of “The Google Effect”
    10/4/2016

    Supporting departments within organizations have traditionally focused on managing and continually improving their own services. By Nancy Van Elsacker, president, TOPdesk USA

  6. Avoiding A Hatton Garden-Style Data Center Heist
    10/3/2016

    In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, criminals entered the building through a lift shaft and cut through a 50-cm thick concrete wall with an industrial power drill. Donald Meyer, Head of Product Marketing, Data Center at Check Point Software

  7. How To Use Ransomware To Drive BDR Sales
    9/29/2016

    The concept of ransomware is not new — it has been a part of the cyber threat landscape for more than 20 years. But, what makes it important to today’s cyber-security conversation is the emergence of “crypto” ransomware, i.e. CryptoLocker, CryptoWall, Locky, TeslaCrypt, and more recently Cerber. By Neal Bradbury, Senior Director of Business Development, Intronis MSP Solutions by Barracuda

  8. 6 Ways To Drive Greater Return On Your Process Improvement Investment
    9/28/2016

    Improving processes isn’t just about creating new flowcharts and Word documents; it’s about improving the consistency and quality of execution, increasing efficiency, and facilitating innovation within your organization. These are the guidelines and workflows that, when managed effectively, can define and improve how your company operates from the C-Suite to the server room.

  9. Access Governance And The Cloud: The Reasons Why
    9/26/2016

    Access governance continues its climb toward becoming a dominant force in a growing market in a plethora of industries throughout the U.S. and beyond. Organizations now more than ever investing resources in access governance solutions so they can improve process efficiency and the security of their networks without much effort. By Dean Wiech, managing director, Tools4ever

  10. How To Keep The Best Staffers
    9/19/2016

    How to keep great teammates. We’ve all had it happen, great people that we love to work with come in to your office with a nervous look on their face: “can I uh….can I talk to you for a second?”.