Now that many businesses are comfortable with working remotely, it’s time to review how to secure work-from-home users in order to achieve optimal business results. Do you want flexibility for your users? Do you want a system that is easy to scale and manage? We compare the top two ways of securing remote users so you can decide what is best for your business.
Darin Andersen and Daniel Obodovski from Seamless Podcast welcome special guests Sean Ernst, Darren Bennett and Tom Caldwell in this podcast “Smartcity Tech Trends: State of IoT in 2020.”
In this round-table podcast:
- Darren summarizes the new security concerns covid-19 brings to businesses.
- Sean discusses the main security considerations for businesses selecting between endpoint models vs centralized data models.
- Tom reveals the best practices businesses should use when securing and measuring IoT sensors.
- The round-table discussion also reviews:
- How certain kinds of technology accelerates work-from-home productivity.
- The pros and cons of the different security frameworks that are popular with many businesses.
Listen here or on your favorite platform below.
Last week we were honored to team up with the FBI (in partnership with the Cyber Center of Excellence (CCOE)) and Biocom on behalf of our biotech heros. The team hosted an exclusive executive-level briefing on cybersecurity specifically tailored to San Diego’s life sciences industry. This Biocom-member webinar contained an overview of the security challenges companies are facing in 2020 and beyond. In addition to industry-specific advice and an overview of current insider threats, the FBI left us with the following FBI cybersecurity resources and covid-19 recommendations.
IT services and IT security are not mutually exclusive. So why do managed service providers (MSPs) treat them differently? Why do they often set up separate entities to provide these services?
What many IT service providers don’t understand is that these two concepts work in tandem: IT services influence IT security, and vice versa. We think it’s time to integrate them once and for all.
Here’s why you should incorporate IT security into your managed IT services.