December 31, 2017 is an important date for many in the DoD world. For those with contracts subject to DFARS 252.204-7012 it might feel like an overwhelming and impending date. I am sure this is another heavy responsibility thrown onto your plate with the expectation you get it done.
Here is a blog by our friend Joe Stangarone of mrc's Cup of Joe Blog. He writes about the dangers of shadow aka stealth IT and how to spot it. Shadow IT is basically software and services that enter your company network without your knowledge or permission. Here is his blog....
Summary: A growing trend, “Shadow IT” is a term used to describe IT systems and solutions built and/or used inside organizations without the approval of the IT department. This could include anything from employees emailing spreadsheets back and forth to entire departments licensing third-party, cloud solutions behind IT’s back. The problem: Since Shadow IT usually happens on the sneak, IT departments don’t know where (or how much) it’s happening. Is Shadow IT lurking in your business? Read this article to learn the warning signs.
Like it or not, Shadow IT is probably alive and well in your organization. Recent surveys find that it’s not only growing, it’s far more rampant than business leaders realize.
What can you do about it? In past articles, we’ve explored a few ways to address and reduce risks of Shadow IT. We’ve looked at:
- Ways to prevent Shadow IT.
- How to reduce security risks of Shadow IT.
- The benefits of embracing Shadow IT.
That being said, there’s still a problem: You can’t address Shadow IT if you can’t see it. How do you know whether or not Shadow IT lurks in your company?
Long Beach, CA - If you have not attended Adaptive Business Leaders annual presentation “Top Tech Trends” you should plan on it next January. This year was another stupendously insightful presentation on what we should expect from technology in the [...]
Now that you have settled into the New Year it is time to focus on you New Year resolutions for IT or you risk a bad year. It is February 1, 2017 and you now have all the year-end closing of the books, inventory, etc. behind you. Now that your head is cleared up it is time to get more focused on IT.
This blog is a compilation of ideas from Team Alvaka Networks:
1. Roger Nixon said, Keep moving forward by backing up… the importance of good backups for sustainability of a business when things go wrong. Actually almost everyone at Alvaka said something similar. Roger is right. If you have not recently done a complete review of your back up systems you are at great risk. Ask yourself and test whether –
a. Is your backup system running? Is the scheduler running backups at the appropriate intervals?
Irvine, CA - Even the biggest of the antivirus software vendors are beginning to give up the fight against malware. The traditional ways of fighting just don’t work anymore. It is too reactive and labor intensive… not to mention just inherently flawed at this point. If you have been to our lunch and learns the past couple of years you know that at Alvaka Networks we down-play significantly the role and importance of firewalls and AV software. Sure you need them, but oftentimes users rely on those two tactics at the neglect of other often more important and effective solutions. If you want a comprehensive solution based upon tools you likely already own you should read this – What 12 Security Things Should I Focus on to Be Defensible in 2016? These are just as valid for 2017.
What is the breaking news on the demise of antivirus software as we know it? Well, it simply does not work well today and in the future. Here is a link to...
Orange, CA - I have been attending monthly MI3 meetings at CHOC Hospital in Orange County, CA. MI3 is the Medical Intelligence and Innovation Institute. If you are in healthcare or interested in innovation these meetings on the third Monday of the month from 4 to 6 p.m. are worth attending.
In this video Kevin McDonald interviews Dr. Anthony Chang, the Chief Intelligence and Innovation Officer of CHOC Hospital on data science, artificial intelligence and the other innovations being promoted at CHOC.
Orange County, CA - I was talking to a client today. He is the IT director for a mid-size international manufacturer of manufacturing equipment. He is upgrading a bunch of his Windows Server operating systems. Some are physical, most are [...]
This reply to my blog, Should I buy cyber insurance? is written by David McNeil, principal, of EPIC Insurance Brokers & Agents. He brings 20+ years of professional industry experience to the topic on cyber insurance. Some of Alvaka Networks' clients have been utilizing Dave's services for many years.
Always enjoy your insights and thoughts on Tech-related subjects. Lately, the plethora of headlines regarding cyber-related issues has meant the interest in cyber-insurance has reached a new level. This is a huge topic and this comment can only scratch the surface.
That said, a bit of an insider-view may be helpful…
Currently, cyber-insurance coverage forms are NOT standard (ISO) forms. As a result, insurance carriers forms differ greatly. Many parts, definitions, limits and coverage triggers are negotiable.
Definition negotiations are critical. It is important to know what to look for and how to modify a particular carriers form to best suit the needs of a specific client/insured.
EXAMPLE: Trigger for Notification of a Breach - (A hypothetical…. Sort of)....
mrc's Cup of Joe discusses 5 ways CIOs and IT leaders can do more with less Summary: CIOs and IT leaders face a daunting task. Gone are the days of simply supporting the business. These days, the expectations placed on [...]
Orange County, CA - “Robert Faletra, CEO of The Channel Company, which publishes CRN, said the evolution toward the Strategic Service Provider model marks the fourth major shift in channel nomenclature since the publication's founding in 1982. When the channel was born its constituents were known as Resellers, a business model CRN declared essentially dead in 1990 in favor of VARs (value-added resellers). VARs evolved into Solution Providers, a term that incorporates both Managed Service Providers (MSPs) and Cloud Service Providers (CSPs). And now CRN heralds the dawn of the Strategic Service Provider era.”
That is what Steven Burke wrote recently in a story titled, The New Channel Model: Rise Of The Strategic Service Provider.
What is the “channel” and who is CRN? The channel is a term coined long ago by the folks at computer industry publication CRN back in the early 1980s when they were known as Computer Reseller News. The channel, as it is known, is the group of players that brings to you, the end-user, all the PCs, servers, monitors, Microsoft Windows, Adobe products, network cables, printers, scanners, et al that you buy constantly. The channel is your computer dealer and the...