Security

  • IT Security Experts: Look for Risk and Opportunity in the Security Shadow

    by Michelle Peterson  | March 27, 2015
    There are security risks that fall outside of the normal IT security parameters, but still open the door to data breaches. It’s in those gray areas — call it shadow IT — where IT security providers can identify both risk and financial reward.
    Full Story
  • ChannelTrends: Sell Quality Protection, Not Fear

    by Brian Sherman  | December 04, 2014
    Cyberattacks are a good way to spook your customers, but sensationalizing security concerns will only reap short-term benefits. Successful solution providers will instead offer real world examples of existing threats without overhyping a customer’s potential exposure, and use tools like CompTIA’s IT Security Assessment Wizard to create a comprehensive outline of a customer’s true needs.
    Full Story
  • ChannelTrends: The More You Protect, the More Your Company Profits

    by Brian Sherman  | October 31, 2014
    Small business owners used to buy and install adequate AV software packages themselves without major technical issues, but the threats and the complexity of the protection schemes have risen beyond their capabilities. IT security is no longer just an annual install or occasional update — it’s an ongoing responsibility.
    Full Story
  • Boston Celtics Get an Assist from CompTIA’s IT Security Community

    by Michelle Peterson  | October 07, 2014
    Students at Boston’s Mildred Avenue K-8 School and Community Center can thank CompTIA’s IT Security Community and the Boston Celtics for help in renovating the center’s computer lab and teen space. With help from the Creating IT Futures Foundation, the IT Security Community donated $5,000 to the Boston Celtics Shamrock Foundation, which allocated the donation to its Player Choice Grant, a grant that allows members of the Celtics roster to vote on where the money should go.
    Full Story
  • ChannelTrends: Data Breaches Show It’s Necessary to Take IT Security to the Next Level

    by Brian Sherman  | September 22, 2014
    From Fortune 500 companies to mom-and-pop stores, every organization needs solid IT security specialists who can audit current systems and policies, recommend and implement proper upgrades, and monitor and support it all. Explore our related security resources — including a trustmark, executive certificate and quick start guide — and make sure your solution providing organization is up to the task.
    Full Story
  • The Internet of Things is Missing Something: Security

    by Chris Gonsalves  | April 23, 2014
    This sponsored blog entry was submitted by Chris Gonsalves of ChannelNomics. There’s a dirty little secret in the grand promise of the Internet of Things. Within the rapidly proliferating realm of talking machines that enables this hyperconnected ecosystem, there is a woeful lack of security. That shortcoming could leave important systems vulnerable to compromise and ultimately threaten the viability of an emerging technology space on which many have pinned high hopes. Understanding t ...
    Full Story
  • ChannelTrends: Making 2014 the Year of Security

    by Brian Sherman  | January 29, 2014
    Add Neiman Marcus to the growing list of retailers that have announced information systems breaches over the past few weeks: In a company statement, the Dallas-based department store chain reported compromised servers, a hack that gave outside access to customer payment information. On the heels of Target’s holiday debacle, the news fueled the IT security discussion and elevated consumer angst. This should be a call to arms for solution providers, vendors and distributors. No business will ...
    Full Story
  • ChannelTrends: The Ever-Increasing Value of Top-Notch IT Security Skills

    by Brian Sherman  | November 21, 2013
    Over the past few years, hackers and other cyber-miscreants have managed to create a never-ending list of ways to attack both private and commercial networks and computer infrastructure. Their activities not only slow down systems and disrupt critical operations, but often lead to more serious crimes such as identity theft and corporate espionage. By all indications, the threats are multiplying and becoming much more difficult to neutralize or remove. Of course, those unknowns create more opport ...
    Full Story
  • Why Are We Still Talking About Security?

    by Seth Robinson  | November 14, 2013
    Security may not be as hyped as other tech trends like cloud computing, mobility or Big Data, but several CompTIA research studies have shown that it remains a top priority for businesses among a wide range of IT initiatives. However, that may not necessarily translate into businesses having a robust security posture or knowing which steps to take as they explore new technology models. CompTIA’s Eleventh Annual Information Security Trends study examines the areas that may need closer atten ...
    Full Story
  • How TeamLogic IT Utilizes its Security Trustmark Status

    by Emily Matzelle  | August 13, 2013
    What if protecting your business’s confidential data and information was as easy as hiring a bodyguard? Who would you hire? What questions would you ask your candidates to be sure that this person has your company’s best interests at heart and the ethical values to back them up? Safeguarding private information is a matter that cannot be taken lightly in this digital age. That’s why CompTIA created the CompTIA Security Trustmark to help businesses identify solution providers th ...
    Full Story
First PagePrevious Page
Next PageLast Page
Page: of 10