The move to outsourced security

Of the 5 reasons for the outsourcing of IT security, the Cisco Annual Security Report 2016 found that 55% of organisations with fewer than 500 employees chose “more cost efficient”.  The figure for all organisations surveyed was 53%, making cost efficiency the number one reason for choosing outsourcing across the board.

There are other reasons too, around independence and expertise, as we have found as our relationships with customers have developed over the years.  As an example, here’s how the changes at one of our customers bears out the Cisco data.

Read the rest of Mike's blog on how to recognise the signs here.

IT Security in the shadows

Shadow IT - the adoption of technology within an organisation that doesn’t come through the approved IT processes – has been seen as a something of a nuisance for those responsible for IT security and compliance. 

What IT don’t know about, they can’t secure or mitigate any consequences of.

To address the challenges, IT and “the business” to be more closely aligned, with the right budgets and other resources, so IT is seen as an enabling rather than blocking function.  In addition, aligning resource within IT specifically to innovation could be the answer to helping IT lead rather than follow, therefore bringing shadow IT back under control.

Read Dave's blog here.

Cyber Security for Non-IT Decision Makers

Cyber crime is big news for organisations of all shapes and sizes in every sector.  Consequently, every board member has reason to want to understand how their organisation is protected. 

However, it can seem like a labyrinth of complex jargon and technical terminology to non-IT decision makers.

Our recent blog outlines the key principles that board members should bear in mind and a list of definitions of the most common threats in the market today.  Take a look here.

Challenges of an ageing infrastructure

Security lesson number one is “Make sure all your patches are up to date”.  It’s basic IT housekeeping, but it does often fall to the bottom of the “to do” list.  Why?  Because nobody wants to be taking the business offline or breaking core infrastructure at 3am!

Like a lot of things, patching is a trade-off.  When you apply a patch you are almost certainly taking systems offline, in the case of a security patch you’re taking a system offline to address a problem that may never be seen and the patch may make the system unstable.  Does the patch justify the pain..?

Read Jacqui's blog here.