Expert Insights

blog

Windows Defender vs. Windows Defender ATP

Beyond turning on a firewall, the next basic steps to protecting a system are to activate anti-virus and anti-malware software. Windows now provides these functions built-in, in the form of the Windows Defender tool. (Users have the option of turning off Windows Defender and instead using third-party tools.) Windows Defender provides classic, signature-based analysis on a real-time basis. That is, if a user tries to launch a file recognized as bad, Defender intervenes. Note that while IT administrators might also benefit from a management tool to harvest reporting data from Defender, the tool itself operates effectively without any other software installed.
 

Ted Wentzel by Ted Wentzel

Survey Data Indicates Big Gap in GDPR Readiness

GDPR is at the forefront of our conversations with clients, as more and more IT leaders in the U.S. are increasingly recognizing how GDPR rules will affect them.
 

Ted Wentzel by Ted Wentzel

3 Steps U.S. Companies can Take to Prepare for GDPR

If it feels like the General Data Protection Regulation is right around the corner, that’s because it is! The new European privacy law will go into effect May 25, 2018, which leaves companies with just over six months to prepare.

Ted Wentzel by Ted Wentzel

How will GDPR work to protect data subjects?

With less than eight months until the General Data Protection Regulation takes effect, we’re gearing our readers up for the changes with a series of blog posts exploring details of the new law. So far we’ve covered what GDPR is and why it’s important, consequences if you’re not compliant, and the top three changes to expect under the new law. This time, we’re going to delve into rights of the data subjects and how they’ll be protected under GDPR.

Ted Wentzel by Ted Wentzel

Approaching Security Projects After Prior Efforts Failed

Sometimes in our work with clients we assist with security projects that occur subsequent to one or more failures in prior efforts to achieve security improvements. In these situations, we are usually able to quickly identify the reasons why past efforts failed and plan a new project that we know—based on many experiences elsewhere—will succeed. Sometimes the new project uses the same technology as the failed project. Sometimes we suggest an entirely different approach.
 

Chris Blackburn by Chris Blackburn

Return on Security Investment - use this ratio!

With more recent publicity regarding hacking of personal data it is surprising how many businesses need to secure their systems.  In our world, regardless of what vertical business we are in – manufacturing, retail, financial services, healthcare, education, or government – securing data and infrastructure should be of the utmost importance to a CFO today.  It can take up to 200 days to even realize there was a breach!
 

Tracie Parent by Tracie Parent

Top 3 Changes to Expect Under GDPR

We’re living in a data-driven world, which has evolved drastically from the 1995 directive established to protect EU citizens from privacy and data breaches. Although many of the key principles are the same, changes will be made to keep up with the times and ensure better protection. Let’s explore the top three changes under the General Data Protection Regulation to get a better idea of what’s to come.
 

Ted Wentzel by Ted Wentzel

What are the consequences of not being GDPR compliant?

The General Data Protection Regulation will be in effect less than a year from now, which is why it’s important for everyone to understand the law as well as the consequences that come from not being compliant.

Ted Wentzel by Ted Wentzel

What is the European Union’s GDPR, and why is it important?

With less than a year before the General Data Protection Regulation takes effect, we’re kicking off a series of blog posts to get everyone up-to-speed with the changes. The GDPR is a new European privacy law that will require companies, government agencies, non-profits and other organizations that offer goods and services to people in the European Union, or analyze data tied to EU residents, to make some pretty big policy changes.

Ted Wentzel by Ted Wentzel