eSights: Blog

eSights: Blog

ePlus is known for our engineering talent and rigor, and we employ many experts who have a keen pulse on the IT industry. From security, cloud, and storage to lifecycle and deployment services, our staff has a unique perspective. Read our thought leadership articles below.


  • Medical Information Security & Medical Imaging Encryption

    • Ken Puffer
    • Jan 15, 2020
    Securing networks from outside threats and periodically evaluating these tools and alerting mechanisms has become commonplace in most organizations. It is reassuring to see that external threats have gained the attention of hospital boards and that additional support is being put behind data security. With the continuing instances of breaches and ransomware attacks that are reported, the process of effectively protecting an organization remains complicated.
    Continue Reading >
  • Cyber Security 2020: A Look Ahead

    • ePlus Security Team
    • Jan 13, 2020
    Hindsight is 2020 -- and given the increase in cyber-attacks we saw in 2019 -- we don’t need a crystal ball to predict that 2020 and the coming decade will keep cyber security in the limelight as the single most important foundational anchor to organizational success, and smooth operations. A fresh new decade will bring with it a freshly evolved set of threats, concerns and sophisticated cyber-attacks.
    Continue Reading >
  • Cyber Security Insurance

    • Ken Puffer
    • Jan 8, 2020
    Cyber Security Insurance, or Cyber Liability Insurance, is a category of insurance products that is intended to cover losses associated with data breaches, network security failures and business interruption from these events. Cyber Security Policy coverage varies, but most include: errors & omissions, media liability, network security and privacy.
    Continue Reading >
  • Stay Safe This Holiday Season

    • Paul Lenhard
    • Dec 16, 2019
    The 2019 Holiday season is in full swing. While we spend time with loved ones, search for the next “it” device, or simply take a breath from this year’s pace of life, we must remain cognizant that threat actor campaigns are ready to catch us off guard. Our data continues to be under constant attack. Here are a few helpful tips to ensure you’re adequately protected all season long.
    Continue Reading >
  • A Managed Security Services Q&A for First-Time Buyers

    • Ron Barnes
    • Oct 18, 2019
    How common is cybercrime? Well, one expert notes a ransomware attack occurs every 14 seconds. And in a separate article, he says cryptojacking, distributed denial of service attacks, phishing, and other schemes are costing the world economy $2 trillion a year.
    Continue Reading >
  • Poor East-West Visibility Gives Hackers a License to Steal

    • Sam Curcio
    • Oct 3, 2019
    Lack of visibility into east-west traffic is a problem for data-center operators and their ongoing battle to prevent a breach or theft of sensitive and confidential information. If organizations cannot monitor and log internal network segments, they cannot respond to active threats or prevent hackers from stealing confidential and sensitive information which often times includes customer and employee data.
    Continue Reading >
  • Enterprises looking to the future of Information Security should look to Purple Teaming Exercises

    • Brian Zimmer
    • Sep 27, 2019
    Enterprises looking to the future of Information Security should look to Purple Teaming Exercises. Partnering together as a single Purple Team, defenders – the Blue Team - and the attackers – who are the Red Teams – can better prepare the enterprise for modern adversaries.
    Continue Reading >
  • 4 Myths About GPU Acceleration

    • Andrew Malinow
    • Aug 13, 2019
    Despite a steady increase in GPU development activities, misunderstandings about the value of using GPUs to accelerate workloads persist. In this post, I debunk four of these myths and explain why I think the technology has broader utility than standard artificial intelligence (AI) use cases might suggest.
    Continue Reading >
  • Facial Recognition Systems

    • Marc Cohen
    • Aug 8, 2019
    Every technology has its place, and the people that use the systems have a responsibility to society to ensure the systems are not misused, and data captured is handled appropriately. Technology giants have acknowledged this and called for government regulation of face recognition technologies due to their far-reaching impacts.
    Continue Reading >
  • The Role of Network Access Controls in Healthcare Mergers

    • ePlus Security Team
    • Jun 4, 2019
    Healthcare systems and providers have been seeking ways to increase efficiency and productivity while embracing value-based care models and enabling patient empowerment. Efforts to make these goals a reality have manifested in two ways: the adoption of new tools and technology and through mergers and acquisitions.
    Continue Reading >
  • Three Features that Enable NAC Solutions to Secure Healthcare Networks

    • ePlus Security Team
    • May 16, 2019
    With recent advancements in technology, the healthcare space is changing. Specifically, new applications and connected devices are being developed to improve productivity and patient access to medical information. This is known as the consumerization of IT, in which technology tools and solutions focus on empowering the end user. In healthcare, this means the patient or physician.
    Continue Reading >
  • Demystifying Cloud Security

    • Jeff McCardel and Sam Curcio
    • Apr 30, 2019
    An increasing number of organizations are investigating options to migrate workloads to the cloud or replace legacy applications with a software as a service (SaaS) application. Moving assets from on-premise to the public or private cloud can enable substantial positive business outcomes but requires additional thought around how to protect sensitive information to maintain compliance, audit and privacy requirements.
    Continue Reading >
  • Top 10 IT Healthcare Trends to Watch

    • George Pashardis
    • Apr 4, 2019
    Anyone who walked around the Healthcare Information Management and Systems Society (HIMSS19) show in February saw some distinct themes in Healthcare IT emerging. Healthcare IT is forward-looking, futuristic, full of possibility and global. Keep reading for a breakdown of what’s hot, what’s emerging, what’s top of mind– and what’s full speed ahead.
    Continue Reading >
  • Beyond Cloud – Why You Need A Multi-Cloud Architecture

    • ePlus Cloud Team
    • Apr 3, 2019
    Are you pursuing a multiple cloud strategy? If so, you’re among the majority of companies. In fact, according to Rightscale’s 2019 State of the Cloud survey, 94% of respondents said they use cloud platforms in their enterprise. Not just one cloud platform—on average, they use almost five. In fact, 84% of respondents have a multi-cloud strategy.1
    Continue Reading >
  • An Interview from the Road: RSA Conference 2019

    • Marc Cohen | Jason Nelson
    • Mar 28, 2019
    Read more as we talk with our team on the ground at this year’s RSAC. ePlus Lead Security Engineer Jason Nelson attended sessions, and Marc Cohen, ePlus Solutions Director walked the floor, saw the demos and talked the talk!
    Continue Reading >
  • The Growing Importance of 'Security by Design'

    • ePlus Security Team
    • Mar 20, 2019
    "Security by design" is at an inflection point as a result of advances in automation, orchestration, artificial intelligence and machine learning, says Lee Waskevich of ePlus Technology. In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Waskevich discusses: why security by design is at a critical turning point; leveraging automation, orchestration, AI and ML; and the need for changes in organizations' cultures.
    Continue Reading >
  • Business Transformation Begins with Data Center Modernization

    • Mark Henson
    • Feb 11, 2019
    The world is experiencing a top-to-bottom digital transformation that will impact virtually every aspect of business, from competitive capabilities to security exposure. Making that transformation requires the essential elements of a modern data center – and a solid plan with a trusted advisor to help set them into place.
    Continue Reading >
  • California Data Privacy Bill: What You Need to Know

    • Sophat Chev
    • Feb 7, 2019
    The first data breach of 2019 took place less than 24 hours after the new year. The Australian State of Victoria reported an estimated 30,000 civil identities exfiltrated by way of spear phishing (using email to lure its victim to initiate a vulnerability). The agency claims all personal identifiable information (PII) was encrypted, which thankfully renders the data exfiltrated unusable. This security approach was a result of a compliance effort to meet the GDPR requirement for encrypting all PII data.
    Continue Reading >
  • Reduce Your Attack Surface with an IoT Security Strategy

    • Christopher Williams
    • Jan 24, 2019
    There is no doubt that the world of the Internet of Things (IoT) is here to stay. Consumer grade products such as TVs, speakers, toys, wearables, appliances and much more continue to flood the retail space offering enticing features to consumers. Learn how to reduce your attack surface with an IoT security strategy.
    Continue Reading >
  • SamSam Ransomware: How ePlus Helps Mitigate Threats

    • Marc Cohen
    • Jan 10, 2019
    In early December, the Department of Homeland Security (DHS), the National Cybersecurity and Communications Integration Center (NCCIC), and the Federal Bureau of Investigation (FBI) issued an alert regarding SamSam ransomware. Threat actors exploit Windows servers to gain persistent access to a victim’s network, utilizing SamSam to infect all reachable hosts.
    Continue Reading >

Want to Learn More?

We have proven success engineering and deploying solutions that enable our customers to thrive in today's constantly changing, complex technology landscape.

 

LET'S GET STARTED