More Perspective

ePlus is known for our engineering talent and rigor, and we employ many experts who have a keen pulse on the IT industry. From security, cloud, and storage to lifecycle and deployment services, our staff has a unique perspective. Read our thought leadership articles below.

  • Can’t Find Cyber Security Talent? Try These 5 Things

    • Tom Bowers
    • Aug 15, 2017
    According to a recent survey by Enterprise Storage Group (as reported in this Network World article), 45% of organizations reported a “problematic shortage” of cyber security skills, representing a 17% increase from their 2015 survey results. The shortage of skills creates a problem. But the obstacle is not insurmountable. Despite the talent shortage, here are five things you can do to find resources and build an effective cyber security program.
    Continue Reading >
  • Top Priorities for Healthcare CIOs in 2017

    • George Pashardis
    • Jul 10, 2017
    According to International Data Corporation (IDC), IT spending is expected to reach $2.7 trillion worldwide in 2020. Financial services, manufacturing, and healthcare are expected to lead in spending. Among all industries, healthcare is projected to remain the fastest growing industry at 5.7% compound annual growth rate (CAGR).
    Continue Reading >
  • Connecting Cloud and Security in the Digital Age

    • ​Lee Waskevich
    • Mar 16, 2017
    Cloud adoption is increasing. While growth rate estimates vary, the trend is going up. But some studies reveal that cloud security remains a big concern, and it’s having an impact on cloud services adoption. According to a study by Intel, 49% of customers said they slowed down their rate of adoption last year over security-related concerns, specifically citing a shortage of cybersecurity skills.
    Continue Reading >
  • Optimize Your Security Program with Managed Security Services

    • Wayne St. Jacques
    • Feb 10, 2017
    I talk about security a lot these days. It’s unavoidable, really. In my position, I meet and speak with so many IT people—colleagues, customers, and prospective customers—from commercial industry, healthcare, government, and education. And all of them share one similar concern: security.
    Continue Reading >
  • Ransomware Attacks on the Rise. Take Steps Now to Avoid Being a Victim.

    • Tom Bowers
    • Jan 6, 2017
    Ransomware attacks are increasing. And it’s costing U.S. companies millions to extract themselves from the clutches of these blackmailers—to the tune of $209 million in the first three months of this year, according to information provided to CNN by the Federal Bureau of Investigation (FBI).
    Continue Reading >
  • Worried About Insider Threats? Bolster Your Defenses with User Behavior Analytics

    • Tom Bowers
    • Jan 6, 2017
    Beware of the insider threat. For those of us in information security, those words represent sage advice we’ve heard (and given) for years. Long before Eric Snowden and the incident involving the National Security Agency (NSA) hit the headlines.
    Continue Reading >
  • Malware Slipping through Your AV Defenses? Endpoint Detection and Response Solutions Can Help

    • Tom Bowers
    • Dec 13, 2016
    If you work in the area of IT security—or manage teams of people who do—I bet you’ve heard these statements before (or something similar): We’re constantly battling malware. Although we keep our antivirus software up to date, malware continues to get through. What else can we do?
    Continue Reading >
  • Mitigate Business Risk with a Next-Generation Data Center Firewall

    • Tom Bowers
    • Oct 14, 2016
    Your business depends on applications and data. In today’s digital age, both are vital assets, and protecting them against cyber attacks is essential. But as you know, staying ahead of cyber threats is a never-ending job, and one that seems to get more difficult every day.
    Continue Reading >
  • Avoid the Dreaded SSL Encryption Blind Spot

    • Tom Bowers
    • Oct 14, 2016
    SSL encryption is a vital tool in protecting data in flight. Transmitting sensitive data without modification is risky because if it is stolen, the data is in clear text and easily can be used by identity thieves. SSL encryption addresses this issue by using an encryption algorithm to encode the data before it is transmitted, protecting the data in transit by preventing it from being sent in clear text.
    Continue Reading >
  • Is Your Security Program Effective Against Today’s Advanced Threats?

    • John Otte
    • Sep 30, 2016
    Cyber crime is a sophisticated criminal enterprise, and billions are lost annually through breaches of businesses, healthcare organizations, and government entities; and yes, educational institutions too.
    Continue Reading >
  • Leverage Advanced Threat Intelligence and Machine Learning with Next-Generation Security Platforms

    • Tom Bowers
    • Aug 5, 2016
    Without question, today’s threats are more sophisticated than their predecessors. Cyber criminals have become experts at utilizing innovative techniques and social engineering to breach common layered-security defenses, implanting malware throughout corporate networks and stealing information.
    Continue Reading >
  • Guard Against Advanced Persistent Threats Through Internal Segmentation

    • Tom Bowers
    • Jun 3, 2016
    In 2015, the number of zero-day vulnerabilities discovered increased 125 percent from the year before, according to data compiled by Symantec. In addition, massive data breaches were again reported last year, resulting in an estimated 429 million identities exposed to cyber villains. That’s a huge number.
    Continue Reading >
  • Don't Overlook the Biggest Threat of All

    • Tom Bowers
    • Mar 18, 2016
    The biggest threat to your company’s information security could be sitting two cubicles away from you. Make no mistake. Outside threats are real and shouldn’t be ignored. But the greatest risk to enterprise information security today is the insider threat.
    Continue Reading >
  • It's All About the Data And Keeping It Secure

    • John Reckner
    • Dec 2, 2015
    Data is the life blood of nearly every business. But, what if something happened to that data or it fell into the wrong hands? Want to do analytics on your structured and unstructured data? Good luck if that data is lost, stolen, corrupted or sabotaged.
    Continue Reading >
  • Content Security - It's Not Just for Spam Anymore

    • ​Lee Waskevich
    • Oct 16, 2015
    I speak to customers regularly about security, and one of the first questions I always ask them is, “What are the two most popular applications you use on a daily basis?” And the majority of the time, the answer I get is web and email.
    Continue Reading >

Ready To Begin? Contact Us Today.

Request A Presentation