Industry Insights

Remote Control: How your phone system may be stifling remote employee productivity

Posted by Susan Sison on Jun 21, 2017 8:25:00 AM

Imagine for a moment that you’re a sales manager at a growing company and you’ve just been tasked with building a remote team of 40 sales reps. Your company’s headquarters is in Boston, but these reps will primarily work out of their home offices and much of their time will be spent on the phone — either initiating conversations with prospective clients or engaging existing customers.

Desktop as a Service/Virtual Desktop Infrastructure: Getting ahead of the curve and leveraging the true power of cloud services

Posted by Jeff Hussey on Jul 28, 2015 3:46:00 PM

Desktop as a Service/Virtual Desktop Infrastructure: The Cloud Comes to the Desktop

Virtualization and cloud services have made major inroads into the enterprise server market over the last few years, and the impact has been significant. According to estimates, approximately 92% of enterprises use virtualization and cloud services to some degree, mostly in the areas of server infrastructure and applications. To be sure, there's still quite a bit of room growth even now - while it's true that many organizations have implemented virtualization to some degree, that doesn't mean they've moved more than a small fraction of their environment to the cloud. That said, the enterprise shift to the cloud is clearly underway. 

Your Firewall is the First Line of Defense

Posted by Susan Sison on Jun 21, 2017 8:25:00 AM

IT security threats are growing by the day, and enterprises of all sizes need firewall management services they can rely on. Selecting a trusted security partner to lead your firewall is the fastest way to get peace of mind so you can focus on what your business does best.

From a technical perspective, your firewall is the first line of defense. NCA provides powerful, effective firewall management services using the latest in perimeter defense and active intrusion detection.

Healthcare Providers Cyber Security: Strategy on Assessing Gaps

Healthcare Providers Cyber Security: Strategy on Assessing Gaps

Posted by Gabe Dahlstrom on Jun 20, 2017 8:20:00 AM

When it comes to cyber security, healthcare institutions are among hackers’ biggest targets.

For years, online criminals have launched concerted, conventional attacks to infiltrate healthcare networks. Over the last 12 months, however, they’ve demonstrated the startling new capability to directly attack medical devices – even when they are in use with patients.

Healthcare Providers Cyber Security: Risk Assessment - How does your organization measure your risk?

Healthcare Providers Cyber Security: Risk Assessment - How does your organization measure your risk?

Posted by Gabe Dahlstrom on Jun 29, 2017 8:28:00 AM

Until recently, performing a structured network risk assessment may well have been the last thing on the minds of most healthcare providers. IT services were planned and scheduled based on the essentials – and what could be performed with zero disruption to essential care operations.

Now, the world has changed. Ransomware attacks are consistently growing in size, scope, and sophistication. These attacks can cause healthcare operations to slam to a halt in a matter of just a few minutes. Restoring services can easily cost millions of dollars.

Ransomware Is Not a “Malware Problem” – It’s a Criminal Business Model

Ransomware Is Not a “Malware Problem” – It’s a Criminal Business Model

posted by: on May 10, 2016 5:00 AM

filed in: Threat Prevention, Unit 42
tagged:

Today Unit 42 published our latest paper on ransomware, which has quickly become one of the greatest cyberthreats facing organizations around the world. As a business model, ransomware has proven to be highly effective in generating revenue for cybercriminals in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users – all are potential targets.

Work From Everywhere

Work From Everywhere

Posted by Susan Sison on Feb 29, 2016 8:49:00 AM

Every year, business professionals log thousands upon thousands of hours of international travel. In many cases, they are supporting multi-phase strategic projects that could define the direction of their enterprise for years to come. Wherever their journeys take them, however, it’s crucial to have full access to all the data and tools that come with their corporate network back at home.

Up until recently, corporate “road warriors” had to make due with whatever tools they could load onto their laptops. A number of apps appeared claiming to offer efficient synchronization with the home network, but there was a problem – using a dozen different apps, many of which were never intended to work together, meant inevitable gaps in your view of the big picture.

Desktop as a Service/Virtual Desktop Infrastructure: Getting ahead of the curve and leveraging the true power of cloud services

Posted by Jeff Hussey on Jul 28, 2015 3:46:00 PM

Desktop as a Service/Virtual Desktop Infrastructure: The Cloud Comes to the Desktop

Virtualization and cloud services have made major inroads into the enterprise server market over the last few years, and the impact has been significant. According to estimates, approximately 92% of enterprises use virtualization and cloud services to some degree, mostly in the areas of server infrastructure and applications. To be sure, there's still quite a bit of room growth even now - while it's true that many organizations have implemented virtualization to some degree, that doesn't mean they've moved more than a small fraction of their environment to the cloud. That said, the enterprise shift to the cloud is clearly underway. 

New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer

posted by: and on March 6, 2016 11:30 AM
Unit 42, Palo Alto Networks

On March 4, we detected that the Transmission BitTorrent client installer for OS X was infected with ransomware, just a few hours after installers were initially posted. We have named this Ransomware “KeRanger.” The only previous ransomware for OS X we are aware of is FileCoder, discovered by Kaspersky Lab in 2014. As FileCoder was incomplete at the time of its discovery, we believe KeRanger is the first fully functional ransomware seen on the OS X platform.

Seahawks win NFC Championship….NCA employees win a paid Holiday!

Seahawks win NFC Championship….NCA employees win a paid Holiday!

Posted by Kara Marsh on Jan 27, 2015 12:11:06 PM

KaraMarshNCA Seahawks fans around the region shake in exhilarated elation as their beloved team wins an unprecedented back-to-back NFC Championship game, in possibly one of the greatest comeback victories, ever! There were cheers and tears and a swelling pride that the Seattle Seahawks did it again!

With the certainty of the Seahawks playing in the Super Bowl - the buzz begins at Network Computing Architects, Inc. will CEO (and QB of NCA), Thomas Gobeille declare the day after the Super Bowl a NCA Paid Holiday as he has in year’s past?

Metadata: What You May Have Missed

Metadata: What You May Have Missed

The Internet of Things: Advanced Threats Against Medical Devices

The Internet of Things: Advanced Threats Against Medical Devices
Author: Fran Howarth

ShoreTel Mobility Pro Tips: 5 Things to Make Mobility Work Better for You

ShoreTel Mobility Pro Tips: 5 Things to Make Mobility Work Better for You
By: Clinton Fitch, Practice Manager of Advanced Applications - EMEA

Check out our favorite free sysadmin tools that we use to help us work faster and be more awesome.

Check out our favorite free sysadmin tools that we use to help us work faster and be more awesome.
by Rob Sobers

Technology nerds take over Hot Stove Society….is Tom Douglas in trouble?

Technology nerds take over Hot Stove Society….is Tom Douglas in trouble?
by Kara Marsh

5 Things Privacy Experts Want You to Know About Wearables

5 Things Privacy Experts Want You to Know About Wearables
Posted by:

Metadata Era: What you may have missed

Metadata Era: What you may have missed
Posted by:

A Botnet Worth Geeking Out Over

A Botnet Worth Geeking Out Over
by Michael Perna  |  July 09, 2014

Say Hello to Lifesize Cloud

Say Hello to Lifesize Cloud

Cloud VoIP Phone Systems

Cloud VoIP Phone Systems

The Expanding Data Universe

The Expanding Data Universe

by Cindy Ng

Social Engineering: A Successful Method of Attack

Social Engineering
A Successful Method of Attack
Posted by Jeremy Scott

GameOver ZeuS Media Coverage and Update

GameOver ZeuS Media Coverage and Update
by Chad Kahl

The Growing Menace of Internal Threats

The Growing Menace of Internal Threats

Protect Privacy to Better Manage Risk

Protect Privacy to Better Manage Risk
Author:

3 Challenges for the National Patient-Centered Clinical Research Network (PCORnet)

3 Challenges for the National Patient-Centered Clinical Research Network (PCORnet)

Posted by:

The Other Stories Behind the DoJ’s Indictment

The Other Stories Behind the DoJ’s Indictment

NCA Awarded Certificate of Environmental Accomplishment

NCA Awarded Certificate of Environmental Accomplishment

Looking into the Crystal Ball – What’s Next for Cybercrime?

 Looking into the Crystal Ball – What’s Next for Cybercrime?

Author: Jason is the Director of Cyber Threat Intelligence for RSA

ShoreTel Service Alert - Open SSL Heartbleed Bug- May 2, 2014

ShoreTel Service Alert - Open SSL Heartbleed Bug

Rethinking the CIO: From IT Leader to Business Leader

Rethinking the CIO: From IT Leader to Business Leader

by Rob Roache

Security Awareness Metrics - Measuring Change in Human Behavior

Security Awareness Metrics - Measuring Change in Human Behavior

Metadata: What you may have missed

Metadata: What you may have missed
Posted by:

Why Creative Crowdsourcing Is Good For Business

Why Creative Crowdsourcing Is Good For Business

ShoreTel Service Alert - Open SSL Heartbleed Bug

ShoreTel Service Alert - Open SSL Heartbleed Bug

Subject: OpenSSL Heartbleed Bug

Date: April 10, 2014

The Heartbleed Bug

The Heartbleed Bug

Addressing Data Security and Management in the Public Sector

Addressing Data Security and Management in the Public Sector

Webinar: Thurs, March 27 - 11:00 am PST

Top 10 SXSW IT Talks for Business Leaders

Top 10 SXSW IT Talks for Business Leaders
by Richard G. Twilley

More Articles ...