Recent Articles
-
IT, Business Execs See Security Needs Differently
Security priorities IT, Business Execs See Security Needs Differently Channel partners must deal with the vastly different ways IT/security leaders and senior business executives see their organizations’ security priorities. Highest Corporate Priorities When asked which corporate initiative has the highest priority in their companies, 35% of IT and security leaders said protecting against cyber-attacks was…
-
The Great IT Security Paradox
Data breach The Great IT Security Paradox Most execs say data breaches at their firms are inevitable, yet most believe their data is secure. This paradox makes selling security services difficult. Inevitability of a Breach One-fourth (25%) said they are certain that data breaches will happen at their companies, and another 40% are pretty sure…
-
Five Tips for Keeping Security Costs Down
By John Peterson With the ever-increasing dependency on cyber-security insurance, more and more small and midsize businesses must ensure they have an adequate plan for security. In theory, this could well mean a doubling up of line items on security products. Part of the attraction of managed services providers is the ability to keep costs…
-
12 Key Facts About the True Costs of Data Breaches
Data breaches 12 Key Facts About the True Costs of Data Breaches Organizations can reduce the cost of breaches when they have the right processes and protections in place to minimize exposure, a new study concludes. Biggest Breaches The root causes of the breaches were hacking/malware (35%), unauthorized access (27%) and physical theft (23%). Financial…
-
Ingram Micro Adds Security Assessment Services
Ingram Micro Adds Three Security Assessment Services Ingram Micro has added three professional security assessment services to help channel partners grow their IT security practices. The new services—available now—also address advanced threat protection (ATP) for businesses of all sizes. Developed in conjunction with Cisco, Ingram Micro’s new FirePOWER Network Threat Assessments enable IT service providers in the…
-
Beyond Passwords: Seeking Authentication Options
Password problems Beyond Passwords: Seeking Authentication Options IT security professionals, ready to move beyond traditional passwords, are interested in authentication alternatives, a new study suggests. Plans to Increase IT Security Budget While 95% said they will increase IT security spending this year, 44% said that increase would be more than 20%. Number of Breaches in…