Tag: cyber security

author:

Security

Information Security: Defense-in-Depth Style


Ladies and gentlemen, we’ve reached the fifth and final post of this information security in hybrid IT series. I hope you’ve found as much value in these posts as I have in your thoughtful comments. Thanks for following along. Let’s take a quick look back at …


author:

Security

The Weakest (Security) Link Might Be You


In the second post in this information security in a hybrid IT world series, let’s cover the best-designed security controls and measures, which are no match for the human element. “Most people don’t come to work to do a bad job” is a sentiment …



author:

Security

Help Protect Your Company From a Data Breach


It’s likely no surprise to anyone that the amount of data collected, stored, and analyzed continues to grow exponentially across the globe. From a security perspective, it’s always important to minimize the amount and sensitivity of data stored, but the reality is, if the …



Podcast

Steps to Proactive Cybersecurity — SolarWinds TechPod 006


Ready to implement or expand a successful security program for your customers? In this episode of SolarWinds TechPod, SolarWinds VP of security Tim Brown and senior channel sales specialist Stefanie Hammond discuss the steps you can take. Related Links: 10 Steps To Proactive Security …


Podcast

Security Threats and Cyber Hygiene — SolarWinds TechPod 005


In this episode of SolarWinds TechPod, Tech Talks, host Alex Navarro discusses security threats, the importance of practicing good cyber hygiene, and best practices for managing users and their devices with Mav Turner, Denny LeCompte, and Jim Hansen of SolarWinds. Related Links: SolarWinds Access …




author:

Security

Security Monitoring – It’s All About the Data


In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential. What happens if a threat is detected? What can we do to monitor for …


1

2