IT Blog & Customer Resources - Blog

Ernest Dunn, Director, Secure Networks, Presidio
04/01/14 at 05:48 am
During Partner Summit this past week, I had the opportunity to sit in on the Cisco session called “Monetizing the New Security Model” and I thought was really well done. A lot of the areas discussed were items that I discuss with customers on a regular basis. Our customers face increasing security challenges due to a number of factors including: the complexity of their networks, better equipped attackers and a larger attack surface due to the transition to mobile, cloud and virtual infrastructures.
Ernest Dunn, Director, Secure Networks, Presidio
03/17/14 at 10:40 am
Over 95% of enterprises and government agencies are compromised and don't know it.
Sean Walls, Senior Consulting Practice Manager
09/26/13 at 08:08 am
The world's largest corporations and small Internet stores have one thing in common and that is keeping their customer’s payment card data secure.  The industry standard for security standards and compliance has been set by PCI Data Security Standard (PCI DSS). This is a key business driver for all merchants who accept credit cards, online or offline. The number of transactions processed annually determines the specific compliance requirements that are required; however, compliance enforcement is managed by the individual payment brands.
Joe Leonard , VP of Cyber Security Solutions, Presidio
08/16/13 at 06:35 am
Security breaches and cyber attacks cost businesses billions in lost revenue and recovery costs every year.  It’s not surprising to see Cisco making the latest move to enhance their own security group with the recent acquisition of Sourcefire.  Sourcefire provides best of breed NGIPS, Advanced Malware Protection and endpoint protection and is highly recognized a leader in cyber security initiatives.    
Ernest Dunn - Director, Secure Networks
07/22/13 at 09:35 am
While the term BYOD may be becoming a bit overused, we are really just starting to feel the impact of this movement.  Cisco just released a case study on the financial impact of BYOD which stated that 89 percent of companies are enabling their employees to use their own devices — specifically, mobile devices such as laptops, smartphones, and tablets — for work purposes.
03/15/13 at 04:24 am
In this report, we looked at the data from E-Mail and external attack vectors. Most of the statistics researched showed that Phishing, Virus, and Spam events are down from the first few months of 2013 compared to the last quarter of 2012. However, there was still activity that caused people concern related to the Valentine’s Day spam. This was a traditional spam message that directed unsuspecting recipients to malicious website asking for personal information. Attachments also contained code that attempted to spread the virus or exploit a vulnerability on the local system. This is a standard attack vector and Modus Operando of spam.
02/25/13 at 09:33 am
EXECUTIVE SUMMARY The Bring-Your-Own-Device (BYOD) era of corporate computing is here, and without a doubt, the demand by employees to use their own personal smartphones and tablets to conduct business tasks will continue to grow exponentially in the coming years.  Businesses that do not meet this demand run the risk of data breaches and compliance violations.