1.888.749.9800

Monthly Archives: July 2016

Reducing the Risks of Shadow IT

I was recently asked to comment on what businesses can do to reduce the security risks of Shadow IT. To read the full article click here and if you just want to read my comments – see below.

Plain talk shadow IT exists when corporate IT is failing in a fundamental way.

Weve seen currency traders set up […]

By |July 19th, 2016|Blog, BYOD|Comments Off on Reducing the Risks of Shadow IT

6 ways to reduce Shadow IT security risks

by Joe Stangarone, writer, MRC’s Cup of Joe Blog, July 19, 2016

Summary: A rapidly growing trend, “Shadow IT” is the use of unapproved IT systems and solutions within organizations. End users are increasingly bypassing IT in favor of third party solutions and services. In this article, we explore the security risks of Shadow IT, and a few ways to […]

By |July 19th, 2016|News & Events, Security Breach|Comments Off on 6 ways to reduce Shadow IT security risks
  • Permalink Gallery

    DNS: How it Works and Best Practices to Defend Against DNS-based Threats

DNS: How it Works and Best Practices to Defend Against DNS-based Threats

The Domain Name System (DNS) is a central element in the addressing and routing of all communication over the Internet. Many enterprise IT security professionals don’t always know how DNS works, or how attackers might use it to compromise their data. Following is a discussion about recent attacks and exploits that use DNS and some best practices for defending […]

By |July 6th, 2016|Blog|Comments Off on DNS: How it Works and Best Practices to Defend Against DNS-based Threats