Fully 95 percent of cloud services in use in the average enterprise aren't enterprise-ready, according to the January 2017 Netskope Cloud Report.
Specifically, 82 percent of cloud services don't encrypt data at rest, 66 percent don't specify in their terms of service that the customer owns the data, and 42 percent don't allow admins to enforce password controls.
An average of 1,031 cloud services are now in use per enterprise, up from 977 in the previous quarter.
In 2014, I collaborated with EY to develop Russia’s first risk management business game. It was great fun, and as a result, we created a pretty sophisticated business simulation.
Participants were split into teams of 10, each person receiving a game card that describes their role (CEO, CFO, risk manager, internal auditor, etc.). At the start of the game, teams must choose one of four industry sectors (telecom, oil and gas, energy or retail) and name their company. The game consists of four rounds, and in each round, teams must make risk-based decisions. Each decision has a cost associated with it and a number of possible outcomes. Teams must analyze and document the risks inherent in each decision they make. The riskier the decision, the higher the probability of adverse outcome. At the end of each round, computer simulation model chooses a scenario and the outcome is announced to each team. Each decision has consequences, and the outcome may either make money for the business or lose money.
The aim of the game is to increase the company valuation by properly weighing risks and making balanced business decisions. The winning team is the one that increases its company’s value the most after four rounds.
Despite the redundancy and resilience the enterprise has gained from virtualization and cloud computing, disaster recovery remains one of the most overlooked functions on the IT to-do list.
In many cases, organizations have established backup and recovery services for their primary applications, but without constant care and attention to the processes behind B&R, and the way they are affected by constantly evolving data loads and architectures, the reliability of these services is questionable at best. In the digital economy, it’s not enough to recover – you must recover quickly and thoroughly.
According to recent research from cloud recovery specialist Asigra, the typical enterprise recovers less than 5 percent of its data during the restore process, most of it from file systems. Most data recovery requests are the result of ransomware attacks and losses from cloud-based platforms like Office 365 and Salesforce, and more than half of all requests across multiple industry verticals are for previous generations of data. Only about 13 percent of recovered data was lost due to user error or accidental deletion. What this shows is that while only a small portion of data is typically needed to get applications and services up and running, many organizations still pay a premium for 100 percent backup of their online data.
Cloud-based security continues to emerge as a key growth area. The main reasons for this growth is due to the overall ease of deployment and strong expertise of cloud security teams, and the reduction in investment in hardware/infrastructure required to support the business. Businesses are no longer required to maintain equipment onsite that need a specialist to operate and maintain.
Cloud-based security solutions lower the operating cost because there is less need for upgrading software, monitoring and documenting software security activities. The cost of hardware and software is increasing dramatically which makes cloud-based security an attractive option for companies of all sizes.
According to PWC’s Key findings from The Global State of Information Security® Survey 2016, 79% said they use cloud-based cybersecurity services like real-time monitoring and analytics, advanced authentication, identity and access management. This survey included input from more than 10,000 IT professionals from around the globe.
With 2017 already underway, it’s a good time to look at what we think will be major drivers in the mass notification system market. One recent report estimates this market is to grow from $4.16 billion in 2016 to more than $9 billion by 2021. It appears the focus will be on business continuity strategies and IP-based notification devices. Let’s break those down a bit.
When an emergency happens, its ripple effect can extend beyond the initial incident to produce plenty of collateral damage. Any interruption in service and/or operations will directly impact the bottom line as well as customer satisfaction, brand reputation, and other less concrete but equally important metrics. Companies can spend millions of dollars to recover and continue operating as quickly as possible, from repairs and rebuilding to marketing and PR strategies.
As more companies fear the worst, which would be prolonged or complete organizational shutdowns, they are getting smarter about their emergency response plans. In today’s 24×7 news and social media, one misstep can lead to irreparable damage. Consumers expect a rapid response, one that balances the potential personal loss of its key stakeholders (employees/customer/supplier/partner base) and community with recovery strategies to get the business up and running. Consumers’ patience is fragile.
According to most experts, 2.5 quintillion bytes of data are being created each day, and 90% of the data that exists in the world today has been created in the last two years alone. By the year 2020, it is estimated that 1.7 megabytes of new information will be created every second for every human being on the planet.
More data brings more opportunities to businesses, but it brings new challenges with it, too. A specific challenge that many organizations are facing is safely storing and backing up the unprecedented amounts of data that they are finding themselves in charge of. Research shows that 60% of companies that improperly manage their data and lose it to a disaster will shut down within six months of the event. The importance of a proper disaster recovery plan is more critical than it ever has been before.
Here are six shocking statistics you may not know about Disaster Recovery. They might make you rethink the necessity of having a proven, tested plan in place should something go wrong.
2016 Cyber breach: likely the greatest threat of our lifetime. Kaspersky Lab has released a summary of the major incidents of 2016 and has looked forward into 2017 as to what may happen.
In 2016, the world’s biggest cyber threats were related to three things:
- Desire to disrupt.
The notable threats included the underground trade of tens of thousands of compromised server credentials, hijacked ATM systems, ransomware and mobile banking malware – as well as targeted cyber-espionage attacks and the hacking and dumping of sensitive data. These trends, their impact and the supporting data are covered in the annual Kaspersky Security Bulletin Review and Statistics reports.
Databuoy Corporation has announced that the U.S. Department of Homeland Security (DHS) has granted Safety Act Designation Protections for their ShotPoint shooter localization system. The SAFETY (Support Anti-Terrorism by Fostering Effective Technologies) designation extends DHS liability protection for ShotPoint customers with regard to claims related to or resulting from acts of terrorism where ShotPoint has been deployed.
ShotPoint is a unique sensor system that provides reliable shooter detection and localization coverage for both indoor and outdoor areas. ShotPoint automatically transmits alerts to access control systems, camera systems, notification applications and other subscribers within a second of shooter detection. This effectively removes the uncertainty about whom and where the shooters are, and instantly sets the response in motion with information that is critical to saving lives. Databuoy is committed to providing the most effective and reliable shooter detection and localization product available.
The SAFETY Act provides important legal liability protections for providers of qualified anti-terrorism technologies. Its goal is to encourage the development and deployment of effective anti-terrorism products and services by providing protection against liability. According to Databuoy president, Kathleen Griggs, “Receiving this designation is a great step for ShotPoint. It means that the DHS stands behind our system. They’ve gone through a detailed review and validated that ShotPoint is a potentially life-saving technology.”
ShotPoint can provide both indoor and outdoor area protection for private and public spaces including educational institutions, government facilities, retail establishments, parks and stadiums. “Most businesses view an active shooter as their top threat.” says Ms. Griggs, “Now with the SAFETY Act designation, those businesses can look to ShotPoint as a solution to effectively managing this threat.”
For more information on The DHS and the SAFETY Act, please visit: http://www.safetyact.gov.
With deep roots in the defense research industry and the military, Databuoy Corporation began in 2006 as a defense contracting company specializing in event-driven command and control operations. It has now realigned itself to focus on public safety in the private sector. Databuoy Corporation’s ShotPoint gunshot localization system is a breakthrough technology that can vastly improve the response of emergency services to an active shooter event over current practice in the security industry. ShotPoint uses networked acoustic sensors that automatically detect, locate, and reports the exact time and location of the source of gunfire. For more information: www.dbuoy.com
Stratix Systems (stratixsystems.com), a leading regional provider of managed IT services, as well as office technology, content management and imaging services, based in Wyomissing, PA, announced that it has completed the strategic acquisition of a majority stake in LYNX Computer Technologies (lynxnet.com), one of the leading IT consulting firms in the region, also based in Wyomissing, PA.
Going forward, Lynx will trade as “LYNX Computer Technologies, a Stratix Systems company.” Mark Diefenderfer, CPA, president of LYNX Computer Technologies, will continue to lead the Lynx organization — one with a staff of 30 IT professionals. LYNX principals Peter Mullenberg and Michael Widel will also continue to hold ownership and leadership positions in the organization.
Both management teams agree that the acquisition will take both organizations to the next level of success.
According to Brent Simone, President of Stratix Systems, “It’s a great match. The strategic acquisition of a majority stake in with LYNX Computer Technologies represents another major milestone in both the growth of Stratix Systems and the capabilities and services we can bring to bear for our clients — a combined strength of over 120 professionals.”
Says Simone, “Our goal is to leverage the strengths of two outstanding organizations into a service-driven powerhouse with expanded capabilities, expanded geographies, expanded opportunities and a combined strength that will be very positive for clients of both Stratix Systems and LYNX Computer Technologies.”
According to Peter Mullenberg, LYNX Vice President, “The acquisition by Stratix Systems is so important because both Stratix and LYNX have shared values and goals, a shared commitment to innovation and client service and incredible synergies that both companies can leverage.
With the addition of Stratix Systems engineers, specialists and other client-facing resources to LYNX Computer Technologies’ market-leading organization, LYNX can now offer a greatly enhanced range of services and solutions,” added Simone. “We are very much looking forward to working with their clients to maximize these combined capabilities to help improve productivity and reduce their costs.”
Mark Diefenderfer, CPA, president of LYNX, adds, “Stratix Systems brings real depth of capability for our clients with the infrastructure to provide best in class capabilities and services to the combined base of well over 5,000 clients. It’s very positive news for LYNX employees and our clients.”
“Over the past 20+ years, LYNX Computer Technologies has grown to become one of the most respected IT, Value Added Reseller and web technologies organizations in the region, with an excellent reputation for outstanding service and innovative solutions. Similarly, Stratix Systems, with its 50-year history, has grown 600% over the past decade, also attributes its growth to outstanding service and innovative solutions in IT, Content and Document Management and Imaging. We’re very excited about the future,” say both Diefenderfer and Simone.
About Stratix Systems
With offices in Reading, the Lehigh Valley, Philadelphia, York and Central and Northern New Jersey, Stratix Systems is one of the region’s leading technology solutions partners. Stratix Systems has the people, resources and experience to deliver the IT, content management and imaging support clients need: where, when and how they need it.
Stratix Systems has also earned certification as a Pros Elite 100 dealer in this region. This award certification recognizes the top-shelf achievement and client service of the top 100 service organizations in the country, and Stratix Systems is the only organization holding the Pros Elite certification in the region. In fact, very few providers in the region can match the vast array of total business solutions and responsive service available from Stratix Systems. It’s no wonder why Stratix Systems is the partner-of-choice for over 5,000 organizations throughout Pennsylvania and New Jersey. Stratix Systems is headquartered in Wyomissing, PA.
About LYNX Computer Technologies
Founded in 1994, LYNX Computer Technologies is a Value Added Reseller and Web Technologies Company based in Wyomissing, PA. Over the past 20+ years, as the technology industry has developed at an unprecedented rate, LYNX Computer Technologies has grown to become one of the largest, most respected IT Organizations in the region, with an excellent reputation for outstanding service and innovative solutions based on an unwavering commitment to client support and proven, reliable technologies.
The company provides managed IT Services, full service information technology implementations and integrations primarily for small and medium sized businesses in Berks, Carbon, Chester, and Lancaster, Lebanon, Lehigh, Montgomery and Schuylkill counties. In addition to providing highly reliable Local and Wide-area Network Platforms, LYNX supplies Cloud Solutions along with Network and Server Disaster Recovery, as well as Network Security Products and Services, including Firewall Security Appliances, Antivirus products, AntiSpam/AntiVirus Perimeter Services, Internet Monitoring and Filtering Solutions, computer and networking hardware, desktop and network operating system software, on-going technical support, repair and training.