All 
Cloud 
Healthcare 
Security 
Security Year in Review: Threats, Trends & Tech - Episode 2

Security + ​Lee Waskevich + Jan 10, 2022

Security Year in Review: Threats, Trends & Tech - Episode 2

In part two of our trilogy, called Cyber Schmear of a Year, we explore one of the top trends of the year. No, not the cream cheese shortage… the wakeup call for companies regarding increased cyber liability insurance premiums and supplemental guidelines -- why it’s happening and what you can do to be prepared.

Read more

Security Year in Review: Threats, Trends & Tech - Episode 1

Security + ePlus Security Team + Dec 21, 2021

Security Year in Review: Threats, Trends & Tech - Episode 1

Everyone loves a good trilogy and we’re here to deliver. Over the next few weeks we’ll explore the threats, trends and tech that made 2021 what it was, as we look ahead and plan for what might be in store for 2022.

Read more

Achieve Zero Trust with Access- Part 1: Identity

Security + ​Lee Waskevich + Mar 5, 2021

Achieve Zero Trust with Access- Part 1: Identity

This is the first article in a three-part series: Achieve Zero Trust with Secure Access. Security philosophy has changed. The “trust but verify” approach is now obsolete—due in part to increased digitization, higher cloud adoption, and more distributed users—and it’s been replaced with a policy of zero trust. But building a zero trust security architecture is a multifaceted endeavor.

Read more

The Growing Importance of 'Security by Design'

Security + ePlus Security Team + Mar 20, 2019

The Growing Importance of 'Security by Design'

"Security by design" is at an inflection point as a result of advances in automation, orchestration, artificial intelligence and machine learning, says Lee Waskevich of ePlus Technology. In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Waskevich discusses: why security by design is at a critical turning point; leveraging automation, orchestration, AI and ML; and the need for changes in organizations' cultures.

Read more

Ensuring a Risk-Aware Culture, Year-Round

Security + Paul Lenhard + Oct 17, 2018

Ensuring a Risk-Aware Culture, Year-Round

We are now halfway through Cyber Security Awareness Month. While we all know that we can’t simply place emphasis on risk mitigation for only one month a year, this is a great time to give pause and think about where we are and where we want to go. Below are a few areas that we can spend some time reflecting on to ensure proper organizational security hygiene in order to maintain a strong, risk-aware culture.

Read more

CSC 5: Controlled Use of Administrative Privileges

Security + Russ Ortmann + Oct 11, 2018

CSC 5: Controlled Use of Administrative Privileges

Denying users administrative access to their local workstations is not often received well. As computers have become an integral part of our daily life, users often get upset and frustrated when they do not have the privileges to complete specific tasks. This frustration is usually felt in the IT department as well, both from disgruntled users that are complaining about their lack of access and also from the increased workload because the IT department now needs to complete any task that requires administrative access.

Read more

CSC 4: Continuous Vulnerability Assessment and Remediation

Security + Russ Ortmann + Sep 20, 2018

CSC 4: Continuous Vulnerability Assessment and Remediation

One of the more challenging aspects of cybersecurity is that the job is never done. New vulnerabilities, exploits, malware, and attacks are launched and discovered on a daily basis. According to Panda Security, an average of over 200,000 new malware samples are captured every day. With this continuous onslaught of new attacks coming every day, the security that defends an organization needs to be just as adaptable. In order to complete that mission, both the security technology that has been deployed and the professionals that deploy and operate it must be continually updating their ability to provide a robust security defense. Maintaining a current understanding of the cybersecurity world usually requires a significant investment of time, energy, and resources.

Read more

Spectre, Meltdown, and What Can Be Done!

Security + Paul Lenhard + Jan 12, 2018

Spectre, Meltdown, and What Can Be Done!

As most of you are aware by now, researchers have discovered a set of critical vulnerabilities in all Intel CPU hardware, currently impacting the vast majority of devices in the wild. These devices include desktops, servers, mobiles devices and appliances, regardless of Operating System and whether they are located in the cloud or on premises.

Read more

Top Priorities for Healthcare CIOs in 2017

Healthcare + George Pashardis + Jul 10, 2017

Top Priorities for Healthcare CIOs in 2017

According to International Data Corporation (IDC), IT spending is expected to reach $2.7 trillion worldwide in 2020. Financial services, manufacturing, and healthcare are expected to lead in spending. Among all industries, healthcare is projected to remain the fastest growing industry at 5.7% compound annual growth rate (CAGR).

Read More

Connecting Cloud and Security in the Digital Age

Security + ​Lee Waskevich + Mar 16, 2017

Connecting Cloud and Security in the Digital Age

Cloud adoption is increasing. While growth rate estimates vary, the trend is going up. But some studies reveal that cloud security remains a big concern, and it's having an impact on cloud services adoption. According to a study by Intel, 49% of customers said they slowed down their rate of adoption last year over security-related concerns, specifically citing a shortage of cybersecurity skills.

Learn More

Optimize Your Security Program with Managed Security Services

Security + Wayne St. Jacques + Feb 10, 2017

Optimize Your Security Program with Managed Security Services

I talk about security a lot these days. It’s unavoidable, really. In my position, I meet and speak with so many IT people—colleagues, customers, and prospective customers—from commercial industry, healthcare, government, and education. And all of them share one similar concern: security.

Read More

Avoid the Dreaded SSL Encryption Blind Spot

Security + ePlus Security Team + Oct 14, 2016

Avoid the Dreaded SSL Encryption Blind Spot

SSL encryption is a vital tool in protecting data in flight. Transmitting sensitive data without modification is risky because if it is stolen, the data is in clear text and easily can be used by identity thieves. SSL encryption addresses this issue by using an encryption algorithm to encode the data before it is transmitted, protecting the data in transit by preventing it from being sent in clear text.

Read more

It's All About the Data And Keeping It Secure

Security + John Reckner + Dec 2, 2015

It's All About the Data And Keeping It Secure

Data is the life blood of nearly every business. But, what if something happened to that data or it fell into the wrong hands? Want to do analytics on your structured and unstructured data? Good luck if that data is lost, stolen, corrupted or sabotaged.

Read more

Content Security - It's Not Just for Spam Anymore

Security + ​Lee Waskevich + Oct 16, 2015

Content Security - It's Not Just for Spam Anymore

I speak to customers regularly about security, and one of the first questions I always ask them is, “What are the two most popular applications you use on a daily basis?” And the majority of the time, the answer I get is web and email.

Read more

Ready to learn more?

Preparation and success go hand in hand.
Connect with us or use the form.
+1 888-482-1122