LATEST ARTICLES
Who’s Got Your Back in a World Full of Hacks?
August 3rd, 2018
Category: Newsletters

The quick answer is: almost no one. Before getting to the longer, more thoughtful answer, consider the satisfactions of running your business from home. You cherish your autonomy. Making space for the entrepreneurial spirit is why you’re doing this in the first place. You actually enjoy wearing multiple hats – procurement officer, CFO, head of […]

                 
0Comments
Write a comment
More Trusted, Less Trusted And The Path To Peace Of Mind
June 27th, 2018
Category: Newsletters

It’s time for an enlightened cyber security policy.   The principle of Least Privilege… promotes minimal user profile privileges on computers, based on users’ job necessities. Each system component or process should have the least authority necessary to perform its duties. This helps reduce the attack vector of the computer by eliminating unnecessary privileges that […]

                 
0Comments
Write a comment
The Lesson of the GitHub DDoS Attack: Why Your Web Host Matters
June 25th, 2018
Category: Newsletters

Surviving a cyberattack isn’t like weathering a Cat 5 hurricane or coming through a 7.0 earthquake unscathed. Granting that natural disasters too often have horrendous consequences, there’s also a “right place, right time” element to making it through. Cyber-disasters – which can be every bit as calamitous in their own way as acts of nature – don’t typically bend to the element of chance. If you […]

                 
0Comments
Write a comment
Security: The Cloud’s Ace in the Hole, Not Its Achilles Heel And in Healthcare, the Cloud is Not Only Secure-It Costs Less
May 10th, 2018
Category: Newsletters

In the cloud’s infancy, cloud hosting providers touted scalability, initial cost savings and speed. But the prospect of enhanced security in the cloud — indeed, that  the better cloud deployments now mean that data is safer in the cloud than on a typical unsecured desktop — has altered the conversation. So let’s put this canard […]

                 
0Comments
Write a comment
A quick look at cloud terminology
May 8th, 2018
Category: Newsletters

The more IT terms you understand, the more you can help your institution stay safe   The cloud may be easier and more affordable than advertised, but it isn’t free. Still, computing horsepower is finally a virtual (or, perhaps more appropriately, a virtualization) bargain. It’s entirely possible for your college or university to spend $10K […]

                 
0Comments
Write a comment
Cloud 101 for Real Estate Brokerages: Words to Live By
March 27th, 2018
Category: Newsletters

In my view, the IT vendor’s proper role is to showcase the powerful economic rationale for those in the real estate field to get out of the practice of buying/maintaining hardware that is obsolete practically before the paint is dry. And then to set an example, through grounded, customer-centric initiatives designed to simplify the cloud for these organizations – things like “on-boarding” services, […]

                 
0Comments
Write a comment
Cloud 101 for Real Estate Brokerages: Four Myths in Need of Retirement
March 21st, 2018
Category: Newsletters

Cloud migration involves placing applications (and potentially much more) off-premises and online, shifting the focus from locally-based technology to remote access and deployment.  While some real estate brokerages – local offices and parent firms — are likely to continue buying hardware, the pace of cloud migration continues to accelerate as more and more applications become […]

                 
0Comments
Write a comment
Ransomware, Insurance Apps and the Public Cloud; Lessons for the Cloudless
March 13th, 2018
Category: Newsletters

In May of last year, the ransomware worm WannaCry fueled a massive attack that paralyzed some 300,000 computers in 150 countries, disabling systems at public hospitals throughout the U.K. along with those connected to Telefonica, the Spanish telecom provider, among other victims. The WannaCry ransomware wreaked havoc – but, tellingly, not at the big public cloud providers like Microsoft […]

                 
0Comments
Write a comment
Cyber: No Protection Against Complacency
February 21st, 2018
Category: Newsletters

While data is considerably safer these days in the cloud, no cyberinsurance policy can substitute for active vigilance. Cybersecurity insurance appears to be enjoying a heyday. While it’s been around for some time, the perceived need for it has never been greater, as DDoS attacks and major hacks grab headlines and fray nerves. As recently […]

                 
0Comments
Write a comment
R.I.P., XaaS: Users Must Not Drown In Alphabet Soup
February 16th, 2018
Category: Newsletters

I take no satisfaction in accurately predicting that the defining trend for 2017 would be the weaponization of the Internet of Things. After WannaCry and NotPetya slammed unsuspecting, unprotected organizations with epic ransomware attacks last year, I’m aware that prescience is not always its own reward. As we enter the second month of 2018, I’m […]

                 
0Comments
Write a comment
 
Author

Lisa Gecko
(866) 257-8455
lisa.gecko@infinitelyvirtual.com

Archive