More Things Means More Security

Posted by & filed under BYOD, Security, The Brite Insight.

“We need to empower computers with their own means of gathering information, so they can see, hear and smell the world for themselves, in all its random glory. RFID and sensor technology enable computers to observe, identify and understand the world—without the limitations of human-entered data.” With that statement by Kevin Ashton from the RFID Journal, the… Read more »

Prepare and Protect your business -You don’t get to pick when bad things will happen

Posted by & filed under Security, The Brite Insight.

Irish writer Oscar Wilde once said, “To expect the unexpected shows a thoroughly modern intellect.” Disaster planning plays an important role for businesses in ensuring they can still operate after a major disruption. The unprepared business owner can cost themselves millions of dollars, along with substantial headaches, trying to recover. Creating effective business continuity plans,… Read more »

Managed Services: A partnership in the true sense of the word

Posted by & filed under Managed Services, The Brite Insight.

Many companies are moving away from simple break-fix service level agreements, to deeper-level managed services contracts. These partnerships allow organizations to focus their efforts on what they do best, while leaving the relatively mundane and complex IT matters to the experts. Managed services can cover technology deployment, integration, maintenance, support, security, upgrades, and innovation. This… Read more »

Combating Malware

Posted by & filed under Security, The Brite Insight.

Data loss, or the compromise of sensitive internal documents, can occur in multiple ways. We’ve discussed the non-malicious insider threat, and how that compares to the malicious threat. In today’s blog, the last post in our insider series, we’ll look at how malicious software, also known as malware, plays into the entire equation. Malware is… Read more »

Combating the Malicious Attack

Posted by & filed under Security, The Brite Insight.

Data loss, or the compromise of sensitive internal documents, can occur in several different ways. In the second part of our insider threat series, we talked about the non-malicious threat, for example an employee sending an email that contains private documents. In today’s blog, we’re going to discuss the malicious insider threat. A malicious insider… Read more »

Combating the Non-Malicious Attack

Posted by & filed under Security, The Brite Insight.

For years, we’ve been hearing about malicious insider threats. From Edward Snowden to Bradley Manning, these attacks are high profile and headline grabbing. But organizations also need to protect themselves from insiders who make a mistake or are taken advantage of in a way that puts the organization at risk. This type of threat is… Read more »

A Workplace Nightmare: The Insider Threat

Posted by & filed under Security, The Brite Insight.

BYOD initiatives and the consumerization of technology have forever changed the IT landscape. Employees now have the ability to access corporate data from a multitude of devices from virtually anywhere. Where the insider threat was once posed only by the occasional disgruntled employee, it is now can come from any individual on the payroll. Simply… Read more »