Dec 21, 2015 | All Blogs, Managed Services, Security
If you’ve been in the workforce for more than 20 years, you probably remember the days when your IT help desk person manually installed updates. He or she went computer to computer through the office installing the software update. Needless to say, this was an...
Dec 8, 2015 | All Blogs, Security
IBM BigFix Patch from Flagship Protects All Your Endpoints Software and application patches are a fact of life. There are always going to be improvements and fixes from vendors. Patch management is extremely complex if not managed properly. When your software vendor...
Nov 16, 2015 | All Blogs, Security
Cyber-attacks are becoming overwhelmingly sophisticated. From custom malware to zero-day exploits, advanced security threats are exploding worldwide. Beyond email and web-based threats, cybercriminals are exploiting vulnerabilities in the endpoints themselves. The...
Nov 10, 2015 | All Blogs, Mobile, Security
Are you suffering from “mobilephobia”? If you’re a CISO, and the growing number of mobile devices on your network—and your inability to manage those devices with traditional security measures—keeps you awake at night, then you’ve got a textbook case of mobilephobia....
May 28, 2015 | All Blogs, Security
The 2015 Cost of a Data Breach Study conducted by the Ponemon Institute is now available for download. What truly affects the cost of a data breach? This years study of 350 organizations around the globe details both the cost and impact of data breaches, with...