We recently interviewed a handful of the AIS Client Services team. We thought you’d like to know a bit more about who they are and what they do (and what they prefer to eat/drink). This installment features Mr. Danny Franklin, AIS Client Services Assistant Manager. Thanks, Danny!
Infographic: BYOD Security Boo Boos
Everyone loves an infographic. Especially when the infographic includes a guy with a bow tie and cigar. Posted by Fred Donovan in FierceITSecurity; original infographic posted at bitglass. Emphasis in red added by me. Brian Wood, VP Marketing —— Infographic: Employees admit to flaunting policies prohibiting BYOD Two-thirds of employees who have personal smartphones admit to accessing corporate data from those …
PCI Compliance Yields Unwarranted Security Confidence
“A little learning is a dangerous thing” is widely attributed to Alexander Pope (1688 – 1744) and is found in An Essay on Criticism, 1709: A little learning is a dangerous thing; drink deep, or taste not the Pierian spring: there shallow draughts intoxicate the brain, and drinking largely sobers us again. A little compliance is also a dangerous thing — especially …
Hacker Survey: Hacking Is Fun (and Easy)
You’ve just gotta love it when “the bad guys” participate in surveys so that we (good guys) can better understand their techniques and motivations. I wonder whether anyone has thought of hitting up ISIS and Al Queda with SurveyMonkey? Article posted on Help Net Security. Emphasis in red added by me. Brian Wood, VP Marketing —— 86% of hackers don’t …
When Will We Wake?
Here’s a little fear-mongering to brighten your day. It’s bad and then it gets worse — terrifying, even. It’s not me, it’s you. So fix yourself — all of you out there. And I’ll be more vigilant too. Summary article by Pam Baker in FierceBigData. Emphasis in red added by me. Brian Wood, VP Marketing —— Many IT security pros …
Phishing Myths Busted
Don’t take candy from strangers and don’t get into the car of a stranger. Likewise, on the computer: Don’t click on links, ads, attachments, photos, etc., from strangers. There’s no such thing as a free email! Posted on Cyveillance. Emphasis in red added by me. Brian Wood, VP Marketing —— Top Five Phishing Myths Debunked Phishing is a well-known word …
With Vendors Like These, Who Needs Enemies?
Segmentation. Justification. Compartmentalization. Evaluation. Expiration. Repeat. And train. And remind. And check. And more. Post by Armond Caglar in Help Net Security. Emphasis in red added by me. Brian Wood, VP of Marketing —— Are your third-party vendors leaving the door open to hackers? By now, every security professional in the world should know the story about Fazio Mechanical Services. …
Healthcare Providers Reveal Cloud Adoption Priorities
To absolutely nobody’s genuine surprise, healthcare companies value HIPAA compliance, security, and privacy when it comes to cloud service adoption. Good news: AIS Data Centers has invested in compliance and security to reassure customers and prospects that they’re in good hands when they place their trust in us. Article by Cheryl Kemp in The WHIR. Emphasis in red added by …
How Do Data Centers Keep Cool in the Summer Heat?
Most people find that at some point they have to escape the sizzling summer heat. It can be hard enough to keep your living space at a comfortable temperature when things get hot outside. Imagine how difficult it must be to maintain a cool climate in a room with many servers humming away, producing even more heat on a daily …
CIOs Pushed Aside on IT Spending
CIOs beware (and vendor salespeople take note): “Compared to sales to corporate IT, CEB estimates that technology sales directly to executives close in less than half the time — and have twice the contract value.” Summary article by Emily Poe in FierceCIO; original article by Steve Ranger in ZDNet. Emphasis in red added by me. Brian Wood, VP Marketing —— Business …