Microsoft’s introduction of Windows 10 in July 2015 set the clock ticking for IT organizations around the world to start mapping out their enterprise migration plans. Whether it’s from Windows 7, 8, 8.1, or an earlier version of the operating system, the process will require a significant investment of time and resources. With thousands of interdependent variables to manage, the process is complex and often difficult to manage. To ensure the process runs smoothly and efficiently requires close management and sophisticated tools.
With the recent launch of Windows 10 comes a new era for keeping corporate desktop systems up-to-date. Instead of dealing with numerous complex and costly migration projects, the new process includes faster, more frequent updates that don't require an entire system refresh.
Develop a transition strategy for a successful Windows 10 upgrade, and make this migration your best.
With Windows 10, Microsoft is providing a bridge to the past while, at the same time, offering a path to the future with the introduction of the singular OS designed to support a multitude of devices. This represents a course correction for the company as Windows 8 was largely shunned by corporate IT organizations. The problem was that Windows 8 was so different from Windows 7 that it required significant employee training and support. Also, many IT organizations were experiencing “upgrade fatigue” after their deployment in Windows 7. As a consequence, adoption of Windows 8 and Windows 8.1 at the enterprise level has been relatively weak. Estimates of Windows 8 market share in the enterprise market hover in the single digits, while Windows 8.1 is in the mid-teens.
The following excerpt has been taken from our ebook, The Ultimate Guide to Protecting Your Security Infrastructure in the Broader Data Center. Observe Proper Segregation of Duties System administration and security administration are not the same job, and those functions should be done by different people.
The following excerpt has been taken from our ebook, The Ultimate Guide to Protecting Your Security Infrastructure in the Broader Data Center. Isolate Security Services on a Protected Network While the subject of proper network security design over the entire data center will be the subject of a future article, we still need to consider the special needs of security infrastructure here.
Juniper’s NetScreen series of firewall and VPN devices have not one but two backdoor vulnerabilities, Juniper disclosed. One of these vulnerabilities is an authentication bypass for telnet or SSH logins to the firewall. The other is an encryption weakness that allows for eavesdropping on VPN traffic. Needless to say there has been a lot of discussion in the technicalpress, especially in light of the current political climate around encryption and back doors. Patches are available to cover both vulnerabilities. Juniper notes that no other Juniper products, in particular JunOS based products, are affected by these vulnerabilities.
Digital Guardian asked a bunch of security experts (including me) for their predictions on where the Data Loss Prevention (DLP) market was going in 2016 and beyond.
We recently posted about an uptick in wire transfer fraud through bogus email. Since then we and two of our clients have been the subject of such attacks. All were emails purporting to be from executive leadership (CEOs or Partners) to the people in their organization responsible for finance.
In its most recent quarterly filing with the Securities and Exchange Commission (SEC), Ubiquity, Inc, a Silicon Valley networking equipment company, revealed that they had been the victim of a $46.7 million cyberheist. The swindle is an increasingly common one, known variously as CEO fraud, business email compromise (BEC) or man in the email (MITE) attacks, and it targets companies that make a lot of wire transfers, especially to overseas business partners.
On July 19th security blogger Brian Krebs broke a story on a security breach at adultery hookup site AshleyMadison.com. Actually AM is just the largest of three “adult” web properties owned by Avid Life Media (ALM), all having to do with hooking people up for sexual encounters. Credit was claimed by the “Impact Team” who have threatened to publish data on millions of users unless the Ashley Madison site is shut down. To date neither has happened, except for the identification of two hapless users, one in the US and one near Toronto (where ALM is based). While ALM’s websites remain online, their planned London IPO is said to be in trouble.