header-blog.jpg

Blog

Lessons from 100 Blogs

Posted on Oct 3, 2018 7:21:18 AM

Can you believe it? This is our 100th blog! That’s about 50,000 words over two years and countless cups of coffee. We thought we’d celebrate this momentous occasion by sharing some of the important things we’ve learned through the process of writing 100 blogs aimed at helping you on your own IT journey.

read more »

Everything's encrypted. Now what?

Posted on Sep 13, 2018 7:20:00 AM

Here's a fun fact: Educational organizations have some of the harshest network conditions in the industry. They have:

  • Increasing mobile devices pounding the network incessantly
  • The most stringent content filtering requirements paired with lofty network performance standards
  • Multiple mission-critical applications, many of which reside in the cloud
  • A physical security posture that is...
read more »

We Need a Better Definition of Campus Safety Now

Posted on Aug 30, 2018 7:20:00 AM

We’ve run out of time. The alarm has gone off repeatedly, we’ve hit snooze enough, and it’s time to establish the ultimate definition of campus safety. Now. We’ve discussed this before, but it bears repeating: it’s time for us to start having the right conversation about campus safety, and a huge part of that conversation is arriving at a consensus that will enable everyone to move forward and...

read more »

Network Security Shouldn’t be a Science Experiment

Posted on May 23, 2018 7:20:00 AM

As previously discussed, the days of installing a firewall with antivirus and calling your network secure are long gone. Thanks to an influx of connected devices from numerous sources and an expanding list of network-dependent systems (hello, temperature control and sprinklers!), the likelihood of a network breach is much higher than ever (and also more difficult to detect).

read more »

3 Surprising Areas You Might Be Overlooking in Network Security

Posted on May 16, 2018 11:30:00 AM

In days gone by, educational IT departments followed the antivirus + firewall = network security formula. Unfortunately, those days are over. Because of the advent of cloud technology and the increased utilization of your network for mission-critical applications, the network security architecture discussion is no longer optional. The conversation must happen, period.

read more »

The Surprising Key to Campus Safety

Posted on Apr 18, 2018 7:26:19 AM

 

As we’ve mentioned, when we discuss campus safety with district leadership, we frequently hear about the list of technology that has been purchased and installed. One key to campus safety that’s not typically categorized as a safety measure but which significantly contributes to the security of your students, faculty, and organization as a whole is the expanding technology involving network...

read more »

Network Security is Like Building a Car

Posted on Sep 29, 2017 8:39:43 AM

How is developing a network security architecture like builidng a car? DGI's Vice President, Jason Eatmon, explains in this video:

read more »

Make your Cloud Video Management System More Secure

Posted on Aug 31, 2017 9:20:26 AM

As discussed in our last blog, leveraging a Video Management System (VMS) that is both cloud-based and secure can come with a few challenges. Some organizations might even be hesitant to use a cloud VMS, solely because of some of the additional security concerns. The good news is that cloud VMS can be safely integrated into your security strategy, and can also be a huge asset to your...

read more »

Security Breaches: The London Plagues of Technology

Posted on Jan 19, 2017 10:40:40 AM

Security has been around forever. Centuries ago, there were villages and castles that needed protection, so the citizens built a wall. And then as technology improved, they would build a higher wall, and then they used stones instead of sticks. After that came the moat, then spikes on the wall, then crocodiles in the moat. Meanwhile, with everyone paying attention to this wall and making it as...

read more »

The Compass of IT Security

Posted on Oct 27, 2016 9:32:59 AM

We’ve already discussed several reasons why historical IT security strategies are no longer effective for the advanced practices of cyber criminals today. We’d like to dig a bit deeper into one of the biggest challenges that IT security faces today: the many directions that hackers can take to infiltrate the network. As an IT professional, you are responsible for ensuring that threats are...

read more »

Subscribe to Email Updates

Subscribe to Email Updates

Recent Posts