Fall 2011 Network Armor

RESOURCES YOU DIDN’T EVEN KNOW YOU HAD As 2011 rapidly comes to a close, do you have projects that are left unfinished? Projects 1-10 have been successfully implemented, but what about that one you’ve been putting off? What about Project 11? Is there room in the budget to complete it before year-end? What about staff? […]

Summer 2011 Network Armor

IS THE AIR CONDITIONER BROKEN? NO, THE BUILDING WAS JUST ON FIRE This actually happened at ICS recently. A fire in the basement had everyone evacuated from the downtown highrise and about 7 firetrucks surrounding the building within minutes of the alarm. We immediately enacted our disaster recovery plan.

Spring 2011 Network Armor

#1 WAY TO EARN A RAISE IN 2011… You’re ready to execute on projects 1 through 10, but to really make a difference PROJECT 11 needs to be completed. You need to be able to demonstrate to your managers that you can get more accomplished in less time with the same resources. At this point, […]

Winter 2010 Network Armor

PLANNING YOUR 2011 I.T. SECURITY STRATEGY How long has it been since your organization conducted an independent security audit? Do your networks and systems meet your security and reliability benchmarks? Which industry standards have you selected as the foundation for your security program? If you haven’t formulated answers to these questions, or if you are […]

Fall 2010 Network Armor

HOW MUCH OF YOUR DATA WILL WALK OUT OF THE BUILDING TODAY? Experts estimate that up to 60% of corporate data resides on endpoint devices such as PC’s and laptops rather than on centralized, managed servers within an organization. Data leaks can occur at endpoints more easily and frequently because removable media (thumb drives/flash drives, […]

Summer 2010 Network Armor

IT SECURITY FUNDAMENTALS: INFORMATION SECURITY RISK ASSESSMENT You’ve heard the term Risk Assessment often enough. But cutting through the IT-speak, what is it exactly? What does it encompass? Consider a risk assessment like checking the doors and windows on your network. With all of the confidential corporate and customer information in your database, you would […]

Spring 2010 Network Armor

BEYOND NATURAL DISASTERS: THE INFORMATION SECURITY RISK Natural disasters such as hurricanes, tornadoes and earthquakes are only part of the risk to your business continuing to operate. There are also information security risks. These days, threats can come from anywhere. Businesses with event the most well-thought out business continuity plans must monitor and re-evaluate their plans […]

Winter 2009 Network Armor

NO ONE WANTS TO GET THE 2AM CALL You know the one. It goes something like: …we’ve been hacked ….records leaked …personal information exposed …how could this have happened …may prove financially devastating to the organization… Taking a few simple steps could not only help ensure both your network and your budget are secure – […]

Fall 2009 Network Armor

IS THE ECONOMY REALLY YOUR BIGGEST RISK? Have you looked at your business continuity plan, lately? According to The National Archives & Records Administration, 93% of organizations that experienced an Information Technology service outage for more than 9 days reported bankruptcy within 12 months; 50% were bankrupt immediately. Well-developed business continuity plans, built upon a policy […]

Summer 2009 Network Armor

HOW ARE YOU GOING TO PREPARE? The thing about disasters, whether natural or man-made, is that their timing is virtually impossible to predict. Last year, we told you about a fire in ICS headquarters building. Fire crews evacuated everyone while they ensured the fire was put out and all were safe. That was nothing compared […]