Advancing Health IT Security and Interoperability: 3 Targets

Our recent posts on the U.S. Department of Health and Human Services’ Office of the National Coordinator for Health Information Technology’s “Federal Health IT Strategic Plan 2015-2020” have covered the scope of the plan and gone in depth on one of its top goals, namely, expanding the adoption of health IT. In this post, we’re […]
Missed Upgrade Leads to JPMorgan Chase Cyber Attack

Your network security has been breached and your company’s sensitive data is in the hands of cyber crooks. That in and of itself is a bad enough spot to be in, but the salt in the wound? Hearing security experts say that a simple fix could have prevented the attack in the first place. It’s […]
3 Ways the Feds are Hoping to Increase Healthcare IT Use

In our previous post on the U.S. Department of Health and Human Services’ Office of the National Coordinator for Health Information Technology’s “Federal Health IT Strategic Plan 2015-2020” we laid out the basics of the report and what it could mean for the future of healthcare IT. This time around, we’re going to focus on […]
Punishing Test Casts Doubt on Long-held SSD Beliefs

One of the knocks against solid-state drives (SSDs) was that, despite the higher level of performance they offered, they weren’t as durable as their counterparts, hard disk drive (HDD). As a result, the opinion prevailed that they just couldn’t be counted on. At least not for the long haul, anyway. There was always the fear […]
How the Cloud Could Change the Face of Company Data Centers

Experts are predicting data centers everywhere are about to be hit with a massive increase in the amount of work they’re expected to handle. Is yours going to be ready to manage all of that extra traffic? By 2018, global data center IP traffic is estimated to almost triple from where it stood back in […]
New, Highly Advanced Digital Security Threat Uncovered

It’s been called “groundbreaking” and “almost peerless,” and it’s been lurking in the wilds of the cyber landscape undetected since at least 2008. It’s a piece of malware known as “Regin,” and it has thoroughly impressed – and baffled – hardened security experts since its recent discovery. The malware, which was first made public by […]
Cisco Unveils New App for Easier, Safer Remote Collaboration

It’s one of the most fundamental challenges facing IT teams right now: Providing a secure and efficient way for users to collaborate with each other, even as those same users become more mobile and less tied to one specific type of workstation. At the Collaboration Summit 2014, Cisco announced a new business application which would […]
Cut Cost and Risk with VMware's Free vSphere Optimization Assessment

Faster problem resolution, a more-streamlined IT environment. Those are the kinds of things that make all IT leaders stand up and take notice. Something else that’s bound to catch their eye, especially in today’s world of tight budgets, the word free. Industry-leading cloud and virtualization provider VMware is putting its money where its mouth is and […]
Making the Business Case for an Enterprise Mobility Management Suite

The dividing line between “work computer” and “personal computer” is getting harder and harder to spot. That’s because the ability to work anywhere, anytime is something that’s less of a novelty and more of an expectation these days. And not only do employees want to be able to access their work data from any location, […]
Companies Paying Even More to Resolve Cyber Attacks

Businesses are having to work harder and spend more time trying to effectively contain and then resolve cyber-attacks, and that effort is starting to take a toll on their bottom lines. On average this year it’s taken companies 31 days to contain a cyber-attack. They’ve spent an estimated $639,462 during that 31-day period while they […]