Blog

  • Tech man

    Shadow IT: Risky Business  

    Shadows come in many different shapes and forms, but not all of them are friendly. A shadow IT is one of the not-so-friendly variety. It describes the use of IT services or systems that do not have corporate approval … yet. Can You Say … It happened here at my business. An end user with an approaching deadline acts […]

  • Monitoring

    Why You Should Hire an IT Security Team

    Your business is booming. Thousands of users have signed up for your website. You login to your email client so you can check the amount of money that you’ve made yesterday. Instead of being greeted with a summary of the amount of sales your business has made, you notice tons of emails from your customers. […]

  • shield2

    How Your Trusted Employees Can Compromise Your Corporate IT Security

    As businesses continue to monitor External Corporate IT Security Threats, it is just as important to develop sound strategies for protecting against intentional and unintentional security breaches from within the organization. Often times, the employees who are trusted the most are the ones who either maliciously or without intent, compromise the security of the vital IT […]

  • locked down

    Protecting You Customers from Internet Security Threats Is a Must

    Although Internet Security Threats have been around since the beginning of computers just recently threats have been brought into the mainstream media. At the end of 2013 several companies had malware installed on some of their key systems which led to millions of customers data being compromised. One of the biggest companies that were compromised was Target. […]

  • Securing the Local Administrator Account

    What Is ShadowIT And Is It A Problem

    ShadowIT is the term that’s used to describe the use of IT systems that haven’t received corporate approval.  Such as employees using their own digital devices to access and use company systems.  These are considered ShadowIT systems because they are not usually being used within the company’s approved guidelines for the control, documentation, security and reliability of the company’s security […]

  • headinthesand

    Human Malware – Privilege Sprawl

    (Collaboration of Mike Murphy and Jake Taylor) How can companies prevent employees from gradually, and probably inadvertently, gaining access to more systems and resources than they need?  How much of a security risk is this phenomenon?  What are the most effective solutions? The answer here can be in context of access permissions (where users can […]

  • Wrightson_Shadow_AD_002

    What is Shadow IT? Implications in Desktop Management

    In essence, “Shadow IT” is an average user or department, other than IT, who finds and implements a tool, application, solution, or process to solve a problem without going through the corporate IT department.  There has been an increase in this practice over the last 10 year because the average task worker is more tech […]