Mobile Security: With Greater Access Come Greater Threats, and Opportunity

mobile security
July 18, 2017

If you’ve been listening to the industry analysts you are probably aware of the rapid growth trajectory for enterprise mobility. Mobility is one of the fastest-growing segments of the enterprise technology market. IT spending on mobility-related products, projects, and initiatives is expected to grow from 25% of IT budgets in 2015 to 40% of large enterprise IT budgets in 2018. It is an area that is growing very rapidly, both…

Read More >>

WannaCry OutBreak Raises Concern for U.S. Healthcare Cybersecurity

wannacry healthcare
June 15, 2017

Wannacry was a warning to the U.S. Healthcare community, the chaos that ensued in the U.K. is a cautionary tale of the effects and severity of healthcare breaches. Over 300,000 companies across 150 countries were impacted by WannaCry ransomware, with the U.K. National Health Serivce (NHS) getting hit particularly hard causing thousands of operations and appointments to be canceled. An interesting note is that the NHS wasn’t targeted specifically, but…

Read More >>

Vulnerability Assessments vs. Penetrating Testing. Is there really a difference?

vulnerability assessment
May 22, 2017

Puzzled on Services? Fit the pieces together with vulnerability assessments and penetration testing. Growing businesses come with more opportunities for security breaches, the need for your customers’ to understand the differences between a vulnerability assessment and a penetration test becomes a necessity.  Some will say that there is an overlap and similarities between these, however, the opposite could not prove to be truer. To put it simply, a vulnerability assessment…

Read More >>

BDaaS: Not just another “As a Service” for Cloud and Data Analytics

bdaas data analytics
May 15, 2017

The popularity of “as a service” offerings continues to grow, and it seems like you can pretty much find anything as a service—there’s almost an “aaS” for every letter of the alphabet. One you may know in theory but not necessarily by name is “BDaaS,” or Big Data as a Service also considered to be data analytics managed services. While Big Data continues to flourish in the global market, solution…

Read More >>

Who is watching your wire, other than the bad guys?

firewall security management
March 9, 2017

Have you ever wondered if the bad guys are really trying to compromise your corporate network or those of your customers?  With all the potential targets out there, surely it’s the other guys who have to worry, right? A customer told me the other day that budgets are tight this year and he has so many priorities, that he feels like he has to take his chances with cyber security…

Read More >>

New Year, New Administration for the US Public Sector

government technology
February 13, 2017

Well, we made it through 2016 and there’s no looking back as 2017 has started off with a bang. With a new Administration we are sure to have another whirlwind year – and hopefully one that accelerates necessary Federal IT mandates. Like I mentioned before the holidays, we did see some promising movement in 2016 – the MOVE IT Act, the first-ever Federal Cybersecurity Workforce Strategy and 4,388 data center…

Read More >>

What hospitals must have and should have when it comes to disaster recovery requirements and solutions

healthcare it disaster recovery
February 8, 2017

Post sponsored by Veritas What can critical application downtime cost a hospital? A lot. Last year, Health Information Technology (HIT) surveyed hospitals across the United States on critical application availability. The results were unbelievable. Participating hospitals reported an average of 69 hours of downtime of critical patient apps at a cost to the affected hospital of $7,900 per minute. Let that sink in for a bit. At $7,900 per minute,…

Read More >>

3 important considerations for the booming IoT market in 2017

2017 IoT Market
February 7, 2017

IoT is one of the latest and most buzz-worthy acronyms to enter the technology scene in the last year. IoT, or the Internet of Things, is a term for the concept of embedding computing devices like sensors into everyday objects to allow those objects to send and receive data. Seize opportunities in the growing IoT market while minimizing risk The market for IoT devices and services is rapidly expanding. Gartner…

Read More >>

How to talk to healthcare organizations about their disaster recovery requirements and needs

healthcare-it-blog
February 2, 2017

Post sponsored by Veritas When creating a data protection, backup and recovery strategy, there is a deeper level that must be addressed and that’s critical system availability. It’s extremely important that critical applications are appropriately prioritized during an emergency situation when multiple apps need to all be recovered quickly. This can help ensure real-time patient safety and quality of care goes uninterrupted in the event of a disaster. Healthcare organizations…

Read More >>

Security Success Story Video – Fighting malware with secure endpoints in under 30 days

Fighting malware
January 24, 2017

In recent years, the news has been riddled with stories of cyber-attacks and the devastating effects they have on businesses. Being able to protect your customers’ data and mitigate reputational damage by providing robust security solutions is vital. Hear how David Cristal, VP and GM of Insight Public Sector, partnered with Avnet to bring the “right, smart folks” to the table to devise a solution to protect the data of…

Read More >>

Respond faster to threats with scalable security capacity and disaster recovery

disaster recovery by Avnet
October 27, 2016

Enable businesses to respond faster to threats with scalable security capacity and disaster recovery Why Software Defined Networking should be on everyone’s Software Defined Data Center must-have list Organizations targeting a Software Defined Data Center (SDDC) strategy place significant business importance on time-to-market, flexibility and agility within their IT infrastructure. For many of these businesses, their digital presence generates considerable revenue and requires agile data centers that can handle heavy…

Read More >>

10 steps to fight ransomware AFTER it’s infected healthcare systems

it security ransomware
October 12, 2016

More and more, hackers are turning their attention from banks and financial institutions to healthcare organizations. Why? Because they see healthcare companies as low-hanging fruit. Not only is it relatively easy to infiltrate IT systems, by hacking medical devices, targeting new or uneducated employees and/or from general weak security systems – but also the information being protected is extremely lucrative to criminals. Cybersecurity is a big concern for your healthcare…

Read More >>

Coaching customers to identify, prevent and recover from ransomware

ransomeware
October 5, 2016

Do you know which industry experienced the highest rate of cyber-attacks last year? It wasn’t retail. It wasn’t government. It wasn’t even finance. It’s healthcare. Unfortunately, this trend is expected to continue this year and throughout 2017 as well. Why? Because electronic healthcare records are twenty times more valuable on the black market than other sensitive data, including credit card information. Cyber security is a major concern within the healthcare…

Read More >>

Tis the Season to Slide into SLED

cloud-computing-government
September 27, 2016

In my recent posts, I’ve focused on initiatives in the Federal space and steps Avnet Government Solutions is taking to protect Uncle Sam’s goods. As summer wraps up I wanted to drill down on the other side of the public sector. Last month we attended XChange SLED University and then road tripped to the Sunshine State for NASCIO a couple weeks ago. The state, local and education (SLED) industry provides…

Read More >>

Office of Personnel Management breach one year later – look how far we’ve come

government cyber security
September 6, 2016

It’s been more than a year since the Office of Personnel Management (OPM) breach that exposed the personal information of millions of U.S. Federal workers. You’ve probably seen the news – the breach exposed personal information from a jaw-dropping 22 million people including finger prints, social security numbers and other private information. Victims included current and former Federal employees, retirees, contractors and others who had undergone Federal background checks. It…

Read More >>