Category Archives: Cyber Security

Data Center Providers Are Evolving to Overcome New Security Challenges

Businesses today are facing an uphill battle in the fight against cybercrime, as threats are increasing in both volume and complexity year over year. Gartner predicts that by 2020, 60 percent of digital companies will suffer major service failures due to an inability to properly manage risk.

As the threat landscape continues to intensify, data center providers will need to evolve to offer more cybersecurity solutions for businesses. In fact, this trend is already starting to occur. Webair, for instance, a high-touch, agile cloud and fully-managed service provider, recently announced a groundbreaking partnership with global managed security services provider Oxford Solutions that will grant businesses easy access to advanced cybersecurity offerings as well as a 24/7 security operations center in Webair’s NY1 data center.

Cybersecurity Needs More Women: Here’s How to Fix the Problem

Originally posted to J Patrick + Associates by Alysa Wishingrad,

One of the cornerstones of an effective cybersecurity strategy is agility and the ability to think ahead of the curve. In order to defend against, or better yet stave off attacks you need a team with a diverse set of skills and abilities. Research conducted by Catalyst found that diversity is key to an organizations ability to inspire higher levels of performance, productivity and creativity, which in turn lead to better employee satisfaction and retention.

Extending the Edge: New Thinking on Data Security

Originally posted on Data Center POST

Mike SprungerSecurity, like most aspects of IT infrastructure, has historically been a siloed function. Focused on protecting data, applications, network connections, and with the advent of BYOD (bring your own device) policies, network endpoints, it is a practice that, for most companies, evolved in a reactive fashion – new technology acquired and implemented based on a specific need.

It is not uncommon for a medium-to-large company to have 50 or more different security technologies in place. While fiscally inefficient, this approach has been somewhat effective up to this point in dealing with the types of attacks launched against it.