Aaron Russo - Senior Manager for Tech Sales Data Center
Aaron Russo
Senior Manager for Tech Sales Data Center
Jeff Stork - Software Delivery Practice Manager
Jeff Stork
Senior Service Manager
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Tony Dancona - Vice President of VMware EUC
Tony Dancona
VP VMware EUC, Solutions and Services
»See All Authors


We have searched the depths of our blog to provide you with the latest IT articles on Cybersecurity. Get Connected Today!

Recognizing and Combating Cybercrime

Don't Click, but if You Do

by Stephen Nardone | 10.19.16

Being able to recognize potential threats means being able to understand what motivates the criminals who are trying to invade your environment. It’s fair to say that a criminal is going to value your wallet. The question then is, what data in your environment has the greatest value?

Tags:Cyber CrimeCyber SecurityCyber-attackscybercriminalsCybersecurityIdentity TheftNetworkSecurity

Network Security

A Security-Positive Culture Starts at the Top

Get actively involved to build a culture of security in your business

by Stephen Nardone | 10.17.16

Cybersecurity is vital to every area of your organization. IT officers, corporate officers, finance directors, and human resources managers should all play a role in designing a living, breathing security plan to protect their business. But how do you create a culture of responsible, effective security practices and meaningful threat awareness? Read on to find out.

Tags:Business-ContinuityBYODCyber AwarenessCybersecurityDisaster Recovery

Cyber Security

Stop. Think. Connect.

And Protect!

by Stephen Nardone | 10.03.16

This October is once again National Cyber Security Awareness month and also the sixth anniversary of “Stop. Think. Connect.” the national cybersecurity education and awareness campaign. While targeted at the general public, the campaign is of equal—if not greater—relevance to IT and InfoSec pros.

Tags:BYODConnectionCyber AwarenessCybersecurityDevicesInternetITMalwareMobilityNational Cyber Security Awareness MonthSoftwareSymantec

Cybersecurity Best Practices

Best Practices to Improve Cybersecurity

They May Be Simpler than You Think

by Stephen Nardone | 07.06.16

The threat environment—i.e. malware and zero-day attacks, drive-by downloads, watering hole attacks, and denial and distributed denial of service (DoS/DDoS) attacks—is worsening, and the news and analyses paint a dismal picture for cybersecurity: it’s not a case of if you’ll be attacked, but when. However, making your environment more secure—and if not eliminating, at least drastically reducing your risk—is achievable by implementing the appropriate policies, practices and technologies.

Tags:BYODCybersecurityDoSHIPAAHITECHIDCMalwareNetwork VirtualizationPCISDNSecurity breachesSecurity SolutionsSecurity-Policies


Are You Part of the 6%?

Enterprise-Class Resilience Is Achievable. But at What Cost?

by Kevin O'Connor | 01.15.16

Much like with cybersecurity breaches, it’s not a question of if your data center or network will go down, but when—and what—happens afterwards. And you had better be prepared if you want to be around for afterwards. Business survival numbers paint an ugly picture:

Tags:CloudCybersecurityData CenterDisaster RecoveryNetwork