A recent Global CIO survey by Brocade found that 83 percent of CIOs believe procurement of cloud services without IT engagement will increase. This procurement, otherwise known as Shadow IT, continues to grow as organizations reach for a hybrid cloud solution. But even though hybrid cloud has been one cause of Shadow IT (among many), it can also be a solution. If you have Shadow IT within your organization (and most organizations do), then you technically already have a hybrid cloud solution—it’s just …

Congress recently passed a law repealing a set of Internet privacy rules, in a move that’s taken the media by storm and for good reason. In the wake of this new legislation, there’s been a lot of confusion over what it means for the privacy of consumer Internet data. President Donald Trump still has to sign the new bill, so it isn’t even law yet. But it’s expected he will do so, and soon. No one understands the full impact …

Ransomware has made headlines time and again for its devastating effectiveness on governments and organizations, but researchers are starting to pay attention to a developing trend within ransomware: Ransomware as a Service (RaaS). Ransomware as a Service allows anyone, regardless of programming background or coding skills, to infect computers and extract money from victims. Why are researchers paying attention to RaaS? It represents a new form of malware distribution, where people who have zero coding or programming skills can send …

Everyone wants in with Big Data, whether it’s to get more insight on patient records, customer behavior, or the college admissions process. But if you don’t have the right tools, you can quickly find yourself in the deep end wading through that much data. How do you stay on top of it? Big Data starts at the infrastructure level. Once you have the proper hardware in place, then you can move up the stack and focus on your database and …

Our world is on its way to being completely connected and at our fingertips, thanks to the Internet of Things. But with those millions of possibilities comes the millions of threats of security breaches connected devices pose. It’s an issue that is slowly getting attention, but it will probably take many more attacks like the one on Dyn in October before a change in culture is brought about. If you use devices such as cameras to monitor hallways or medical …

There’s been a lot of buzz around the idea of Software Defined Everything, and it’s considered the next “big thing” in IT. Is your organization ready for the promises of a software-defined world? If not, what do you need to consider to be prepared? What is Software Defined Everything? It’s an overarching term that includes software-defined networking, (SDN) storage, (SDS) and data centers (SDDC). It is also called Software Defined Infrastructure or SDx (Software-Defined Anything). With the infrastructure virtualized and …

More and more industries, from higher ed to transportation, are adopting the cloud and the endless number of possibilities it provides. This has led to the development of the next-generation cloud, known as X as a Service. XaaS, where X stands for anything, is a single service or collection of services that are delivered to the client over the internet. The most common examples are software (SaaS), infrastructure (IaaS), and platform (PaaS), but virtually every layer of the IT stack …

What is malvertising?

Posted on January 11, 2017 by

Malvertising, a portmanteau of “malicious” and “advertising” has quickly become popular with bad guys everywhere. Its first appearance was detected in 2007, and it’s been on the rise ever since. What makes this form of malware so popular? Malvertising is more dangerous than typical malware because as an end user, you could be a victim without knowing it. According to Elad Sharf of Websense, malvertising attracts hackers because “they can easily spread across a large number of legitimate websites without …

Note: This is the second in a series on Shadow IT. In this post, we’re talking about the differences in IT operational models that could lead to Shadow IT in businesses. The way things are now, IT’s speed of change is unable to meet its business’s speed of need, which leads to Shadow IT. Why? Because IT has traditionally been a control-based model, whereas a line of business is adapting and/or moving to a consumption-based model. Let’s review how each …

Note: This is the first in a series of posts talking about Shadow IT, why it exists, and how to mitigate it within an organization. Shadow IT has been talked about amongst CIOs, but according to Oracle, we still aren’t paying enough attention. Why is that? There are many factors, but the big one CIOs might not be willing to face is the problem of goal orientation between the IT department and the rest of the business: They just don’t …

Get started now. Exceptional service awaits.

Live Chat