Managed Services Executive Commentary

  1. Preparing For The Unexpected
    6/24/2016

    Dear? Is that a deer?  Legacy Planning – Preparing for the Unexpected.  What to do now?

  2. Exploiting Windows Vulnerabilities Shows No Sign Of Slowing: The 6 Major Threats To Watch
    6/24/2016

    Recently, I wrote about the continuing threat Windows users face. Despite the major advances Microsoft has made in terms of increased security safeguards available in the latest release, Windows 10, there are millions of PCs still running older versions of the popular operating system which are highly vulnerable and susceptible to external threats. Of the many flavors of Windows still widely used, Windows 7 remains the most popular version of the operating system and where cyber criminals continue to focus much of their efforts.

  3. Uncovering Business Insights Through Cognitive Search
    6/23/2016

    Big Data. It’s among the most pressing challenges — and opportunities — for today’s solution providers. Enterprise data, be it structured in databases and enterprise applications or unstructured textual data from documents (including contracts, letters, emails, newsfeeds, websites, and more) or videos and images, contains a wealth of content that, if searched and analyzed with cognitive intelligence, can deliver valuable insights for the customers you serve.

  4. What’s Your Number? A Business Value Conversation
    6/22/2016

    In the April HTGWAY, I talked about two legacies that we’ll leave as business owners – a personal legacy and a business legacy. Both are critical and obviously related. But let’s focus on the reality of how most of us view our business in regard to provide a legacy – it is a major (if not the major) source of funding four our retirement and future. It’s that simple for most, if we miss in creating enough value in our company we will fall short in having enough dollars to fund our lifestyle in retirement the way we wish it to be.

  5. How To Overcome HSM Cost Objections
    6/22/2016

    Cryptographic keys truly could be called the keys to an organization’s digital kingdom and that’s why they must be protected, both at rest and in use. Hardware security modules (HSMs) were created to do just that. HSMs act as both a locked box and a secure management platform for cryptographic keys — because the fact is, however powerful and flexible a crypto system may be a breach of cryptographic keys destroys its integrity. Consequently, HSMs have become the default foundation of security for any modern crypto system.

  6. Unique And Original Ideas To Provide Value To Your Customers
    6/22/2016

    A key part of any successful business that scales well is an ability to differentiate that enterprise from its competition. This is simple to do if you happen to be an early mover in a particular field. As the market matures, this becomes more difficult. Simply doing what everyone else is doing leads to competition based on price which is not optimal.

  7. 4 Ways To Deal With Cybersecurity Risks
    6/21/2016

    Web application security is a very hot topic these days. So what do CISOs need to know in order to deal with related risks?

  8. Protect Yourself From Cybercrime: 6 Best Practices To Implement Now
    6/20/2016

    Today, most companies have at least a basic awareness of the need to reduce their vulnerability to cybercrime. There is also increasing awareness of the need to be prepared for the possibility they will be the victim of an attack. These are good first steps, but there is a wide disparity of understanding about what exactly those actions and preparations should include, as well as how much emphasis and resources should be dedicated to them.

  9. Life Imitating Art: Understanding The Dangers Of XSS Attacks
    6/17/2016
    Cross-site scripting, or XSS, is a vulnerability so common that not only is it number three on the OWASP top 10, but it also just become a real-life storyline related to the popular hacking TV drama Mr. Robot. When the USA Network launched the website promoting season two of Mr. Robot, a white hat hacker also immediately uncovered an XSS vulnerability that would have allowed an attacker to gather users’ Facebook information.
  10. The Payments Industry Has Gone Vertical And They’re Building Shareholder Value On The Backs Of ISVs And VARs
    6/15/2016

    I’ve spent over a decade advising payments service providers on growth strategy and value creation. For many years, much of the growth and enhanced shareholder value was created inorganically through successfully executed horizontal acquisition strategies whereby payments service providers have acquired other payments service providers. By Adam T. Hark, Co-Founder, Preston Todd Advisors