Don’t waste another minute securing printer vulnerabilities.

Quick question: What’s a better investment of IT resources – configuring printers or optimizing cloud strategy? No, it’s not a trick question. Printers often fall into a subconscious category of technology we think should “just work.” In a perfect world, you could refocus your IT efforts and better spend your time elsewhere after initial deployment, because printer vulnerabilities wouldn’t threaten your network, and Office Space would have taken a bat to the water cooler instead.

If you’re wondering who in their right mind spends that much time on a piece of hardware as benign as printers, we have some enlightening information for you. Printers – being the connected devices they are today – fall prey to the same malware infecting the computer on your desk, and they can even distribute it. Knowing this, it shouldn’t come as a surprise that IT managers find themselves frustrated with the prospect of managing the security of an entire fleet of printers. Watch an entertaining video that shows how if you’re not taking your device security seriously, someone else might be.

How can you spend less time securing printers and more time focusing on the glamorous aspects of IT? We have a few suggestions to get you started. Continue reading

If you paid for Intel vPro technology, you should be using it.

Get more value from your vPro-enabled devices.

As one of the country’s largest solution providers, Zones deploys thousands of mobile devices and PCs powered by high-performance Intel® Core™ processors with vPro™ technology to businesses around the world.

Intel’s vPro technology describes a range of features that enhance the security, manageability, and performance of computers built around high-end Intel Core processors.

But too often, the hardware-enhanced remote manageability and security capabilities that vPro was designed to deliver don’t get activated by IT, leaving a lot of value on the table.

We can help you identify vPro-equipped machines in your fleet and get all the benefits of the features you’ve already paid for. Continue reading

Who’s the New Grandmaster?

Making the right moves to win the security challenge.

This year marks the 20th anniversary of the final match game between chess champion Garry Kasparov and the IBM supercomputer Deep Blue. The world watched as Kasparov became the first world champion to be defeated in a match by a machine. The loss sparked the debate of “man versus machine” in the digital age.

Fast-forward to the present, and the debate continues. Only now, we’re talking about machine learning too. But this is well-established technology. So, why all the interest? The answer is simple Continue reading

When it comes to cybersecurity, the best offense is a good defense.

Every 40 seconds a company is hit with ransomware, and the WannaCry outbreak is a perfect example. WannaCry demonstrates how ransomware attacks can quickly spread across and cripple environments by exploiting critical vulnerabilities in Windows computers – at least in those not updated with the patch Microsoft issued in March of this year (MS17-010) or the emergency update issued for XP on May 13, 2017.

Of course, running out-of-support operating systems such as XP is risky. But, XP by itself is not the biggest problem. The larger issue is complacency around security updates, operating system updates, and OS upgrades across the infrastructure. Continue reading

The future of print technology is here

HP PageWide is reinventing office printing in more ways than one

It used to be a given in the print industry that if you wanted speed, you sacrificed quality – and vice versa. But HP stepped in and decided to disrupt conventional thinking and implement forward-looking investments in print technology.

It all began with the introduction of HP Scalable Print Technology (SPT), which included research and development in printhead technologies, advanced inks, materials, design rules, and precision production methodology.

And from there, SPT evolved into HP PageWide Technology; the latest HP printing innovation that outpaces the competition in numerous ways, and on practically every level. Continue reading

Cybersecurity trends underway in 2017

The past year has seen seismic changes in the cybersecurity landscape.

They’re forcing IT professionals to rethink and re-strategize their organization’s security. They’re being tasked with ways to better control access to their network, gain a deeper understanding of how vulnerable their network is to threats, and develop a faster, decisive response plan when a threat occurs.

If any of the above resonates with you, you’re not alone. The cybersecurity market is expected to swell to $100 billion dollars by 2019. And now that we’re a quarter of the way through 2017, there’s good reason to be forward-looking and take proactive steps to ensure that security is in your company’s DNA.

Gone are the days when traditional security management approaches of multiple point products, manual change processes, extensive policies and data silos, did the trick. Given the growing complexities of networks and rapid delivery of services and applications, a deep, up-to-date rebooting of how you approach your network security is not only crucial – it’s necessary. Continue reading

Meet the challenges of digital business

Cisco Digital Network Architecture

Legacy business processes are becoming increasingly digital, requiring fast and flexible network services to facilitate and support them. On top of that, business leaders and the IT professionals who run them are under pressure to accelerate adoption of big data, mobile, cloud, video, and IoT technologies.

Cisco Digital Network Architecture (DNA) gives you a clear and efficient way forward. DNA centers around a network infrastructure that is not only fully programmable and open to third-party innovation, but can also fully and seamlessly integrate the cloud as an infrastructure component. Continue reading

An ounce of prevention for the healthcare industry

Security assessments for hospitals, clinics, and practices

0116-securityCyber criminals are increasingly targeting the $3 trillion U.S. healthcare industry. Unfortunately, many hospitals, clinics and practices still rely on aging computer systems that lack the latest security features.

Last year, Hollywood Presbyterian Medical Center became the poster child for vulnerability when a malware attack resulted in a $17,000 ransom being paid to hackers in order to regain control of their systems.

Phishing scams are also on the rise, putting billing information, social security numbers, birth dates, policy numbers, and diagnosis codes at risk. That data can be used to forge fake IDs to buy medical equipment or prescription drugs that can be resold. Taken a step further, it can be used to file phony claims with insurers.

To make matters worse, medical identity theft isn’t as easily detected as fraudulent credit card transactions, which are often flagged and canceled by banks before a cardholder is even aware of the incident.

We have to assume that cybercrime isn’t going away anytime soon, but Zones can help you with a number of tools that improve the safety, compliancy, and security of your systems. Continue reading

A better way to secure the cloud

CASB – The smart solution for cloud security

12-5-16_Core-Security_Blog-image_600pxThe most common concern around the cloud is data security. Companies need to be continuously aware of how and where their data is stored in the cloud, all while ensuring they’re compliant with any regulations which apply to them.

Enterprises are struggling to understand the data security and compliance impact of organizational, departmental, and especially rogue or “shadow” adoption of cloud applications. This is where a Cloud Access Security Broker (CASB) comes into play.

Continue reading

Who’s watching over your data?

data-securityTrouble may be lurking in your network

Data breaches are on the rise. According to a recent Ponemon Group/IBM study, the average cost of a data breach was nearly $3.79 million in 2015, and that amount is predicted to increase exponentially in the foreseeable future.

In the past year, we witnessed major commercial and government organizations receiving alarming cybersecurity breaches and attacks. Well-known organizations such as Home Depot, T-Mobile/ Experian, Ashley Madison, Sony Pictures, Anthem, Premera Blue Cross, the Democratic National Committee, and the Federal Government’s Office of Personnel Management experienced cybersecurity issues. Even the IRS wasn’t safe from attack. Despite the fact that these organizations had specialized degrees of preparedness and cyber protection in place, they still fell victim. Continue reading