header-blog.jpg

Blog

Make your Cloud Video Management System More Secure

Posted on Aug 31, 2017 9:20:26 AM

As discussed in our last blog, leveraging a Video Management System (VMS) that is both cloud-based and secure can come with a few challenges. Some organizations might even be hesitant to use a cloud VMS, solely because of some of the additional security concerns. The good news is that cloud VMS can be safely integrated into your security strategy, and can also be a huge asset to your...

read more »

Security Breaches: The London Plagues of Technology

Posted on Jan 19, 2017 10:40:40 AM

Security has been around forever. Centuries ago, there were villages and castles that needed protection, so the citizens built a wall. And then as technology improved, they would build a higher wall, and then they used stones instead of sticks. After that came the moat, then spikes on the wall, then crocodiles in the moat. Meanwhile, with everyone paying attention to this wall and making it as...

read more »

The Compass of IT Security

Posted on Oct 27, 2016 9:32:59 AM

We’ve already discussed several reasons why historical IT security strategies are no longer effective for the advanced practices of cyber criminals today. We’d like to dig a bit deeper into one of the biggest challenges that IT security faces today: the many directions that hackers can take to infiltrate the network. As an IT professional, you are responsible for ensuring that threats are...

read more »

THE (AVOIDED) USB DISASTER

Posted on Oct 20, 2016 1:43:01 PM

A few weeks ago some employees happened to be looking for a thumb drive to flash some firmware on a TV. It seemed like a completely legitimate request, considering their job role and the technology they were working with. Someone happened to direct them to me, and my response was “NOOOOOOOOOOOOOOOOOOOOO!” They both looked at me like I was crazy until I explained my reaction to them. Here’s why...

read more »

Network Security: Why Historical Solutions No Longer Work

Posted on Oct 6, 2016 12:00:47 PM

There’s a lot of discussion and philosophy about network security, but the bottom line is that the question remains: how do you actually secure your network? Most organizations use one or more technologies that address the network edge and the  end point of the system. The problem with this strategy is that while it may have been effective historically, threats today are far more advanced and...

read more »

Gone Phishin’

Posted on Aug 25, 2016 7:43:31 PM

DGI recently experienced a phishing attempt that served as a good reminder to us that those bad actors will attempt to infiltrate any organization – even ones with extensive experience in technology security.

read more »

Subscribe to Email Updates

Subscribe to Email Updates

WHAT’S ON YOUR MIND?