Improve Network Access Control with Cisco’s ISE Portal Builder

How’s this for a balancing act? A company’s network must be an impenetrable fortress to the wrong people (hackers and cyber crooks) while being easily accessible and user-friendly to the right ones (employees, guests and all of their devices). That’s the security tightrope today’s IT pros must walk. However, there is a solution: Cisco’s Identity […]
4 Ways IT Vendors May Be Coming Up Short for Healthcare

Extended care facilities put a lot of faith in their IT vendors to supply the advanced, secure technologies they need to ensure residents receive a high level of care and service. However, the very same vendors those facilities are counting on could inadvertently be leaving sensitive data – including resident’s protected health information (PHI) – […]
Cisco's Midyear Security Report Shines Light on Emerging Threats

The first half of the year saw security pros and cybercrooks locked in a veritable arms race according to Cisco’s 2015 Midyear Security Report. The brand new report explored the latest threats, gave updates on some old favorites of attackers and looked at the ways in which they’re adapting their methods and tools to evade […]
Healthcare's Top IT Mobility Risk - And What You Can Do About It

A mobile, untethered workforce is becoming essential in order for extended care facilities to deliver the highest level of care possible to residents. The flexibility and freedom that are hallmarks of IT mobility make it easier to communicate with residents, solve and report problems as they happen and to closely monitor critical health data. Staffers […]
Too Small to be Targeted by Hackers? New Study Says No

No IT pro worth his or her salt takes digital security lightly. Despite that, it’s still tempting to grow at least a little comfortable with the notion that: “Hackers aren’t going to bother with my company. We’re too small. They’re only interested in things like big companies with a lot of name recognition, popular data […]
'Venom' Bug Puts VMs in Hackers' Crosshairs

There’s a new vulnerability with a scary name in town and it’s causing some in IT to question the security of their virtual machines (VMs). This new bug, which has been dubbed “Venom” (short for “Virtualized Environment Neglected Operations Manipulation”), could allow attackers to roam freely among all of the VMs running on a server. […]
Hackers Find Way to Bypass Windows Security Feature

Typically the saying “everything old is new again” gives a person a reason to hang on to possibly embarrassing old clothes or CDs. Unfortunately, that saying also has implications in other areas, such as digital security. For example, pros who take their eyes off a threat they thought they’d bested may just have it come […]