Home > RSS Feeds > Security
  • NEWS ANALYSIS: Customers who accept credit card payments need channel expertise to help them comply with the new EMV "chip-cards" as soon as possible.

  • Intel Security's five-year security threat analysis finds increasingly "evasive malware and long-running attacks" with the nature of attacks changing as enterprises have moved to the cloud. The Intel Security report reveals that attackers are taking advantage of more users, the overabundance of data now available, growing networks and new devices. Already, attacks and breaches against Internet of things (IoT) devices have started. The "perfect storm was the massive increase in the types and volume of devices, supported by a huge expansion in virtualization and public clouds," according to the report. Some of these threats succeed because businesses ignore easy security measures, such as paying attention to updates, patches, password security, security alerts and default configurations. Businesses also need to implement security policies and procedures. This means changes and improvements around threat intelligence, the recruitment of more security professionals, security technology innovation and engagement with governments, according to the study. Here are key findings from the research that indicate why businesses should pay more attention to security.

  • The trouble with IT security is that it's an undervalued field until something goes horribly awry. IT security is often considered an inconvenience that gets in the way of end users, and shadow IT has come into existence as end users try to circumvent cumbersome security controls. This has led many IT organizations to re-evaluate their approach to IT security. In fact, a survey of 460 IT professionals and 301 business users conducted by Dimensional Reseach on behalf of Dell finds that seven in 10 respondents cited employee workarounds as the greatest security risk to the IT organization. What most organizations want to achieve, however, is some form of context-aware security, which prioritizes threats based on how lethal a given piece of malware is in real time. Of course, this has to be accomplished so that end users' productivity isn't compromised. While solution providers are still a long way from being able to execute on that IT security dream, it is clear that end users and IT professionals alike are frustrated at static approaches to IT security.

  • Although Apple devices may be among the best in terms of overall security and the lower number of attacks directed their way compared with other devices, the way Apple products are used inside the enterprise still represents a significant security and compliance threat. A survey of 2,249 workers in the United States conducted by Dimensional Research on behalf of Centrify, a provider of identity management software, finds there a lot of employee-owned Apple devices in the enterprise and that the majority of them are used to access corporate data that is not encrypted. Perhaps even more troublesome, most end users admit that the passwords they do use on these devices are overly simple and that they share them with others. This creates a significant opportunity for solution providers across the channel to start a conversation about what it will take to secure those devices. The biggest issue, however, may be that most internal IT organizations are in denial about how widely Apple devices are used to access business apps, versus just surfing the Web.

  • Businesses pay nearly double to recover from a security breach if a virtual infrastructure is affected during a cyber-attack, according to a new survey of 5,500 companies released by security specialist Kaspersky Lab in cooperation with market research firm B2B International. It doesn't matter if the company is a large enterprise or a small and midsize business (SMB)—recovering from a security breach involving a virtual infrastructure will result in much higher costs than a security breach in a physical infrastructure. Kaspersky Lab attributes the higher cost to the majority of businesses using virtual environments for their most critical business processes. Security breaches in virtual environments also require additional cost for third-party expertise. Also, many businesses believe that security risks are lower in virtual environments and, often, don't deploy security solutions designed for virtual environments. This opens up opportunities for service providers to help their customers lower their overall risks in virtual environments through education and new solutions. Here are 15 reasons why this is vital.

  • LightCyber's Active Breach Detection, only sold through the channel, looks at user behavior and known attack vectors to curtail potential security breaches.

  • CharTech announced its new Relyenz division, which functions as a value-added distributor for security technologies delivered as a cloud service.