This page contains a Flash digital edition of a book.
PREEMPTIVE PROTECTION


Connect with Experts


Security threats are more of a problem for today’s healthcare industry than ever before. Not only are they increasing in sophistication and frequency, but they also have a whole host of targets: everything from traditional desktop PCs to smartphones and tablets to Web apps. Attackers use many of these gateways—and more—to gain access to sensitive patient information.


In this edition of Connect with Experts, Steve Nardone, Security Practice Director at PC Connection, Inc. highlights the company’s latest Security Services and Solutions. He discusses how to develop and implement a rock- solid security management plan, and how the right IT partner can help ensure compliance as well as protect your valuable information.


Building a Rock-Solid Security Management Plan


Q: YOU’VE COVERED SECURITY FOR A LONG TIME. WHAT CHANGES HAVE YOU SEEN?


A: IT security has changed radically in the area of threats and attacks. I’ve been in the business for 34 years, and I started my career working in the intelligence community. I’ve seen


about everything you can expect to encounter in the security arena. The whole threat landscape has changed dramatically over the last three to fi ve years.


Q: WHAT ARE THE TOP SECURITY THREATS FACING ORGANIZATIONS TODAY?


A: One of our favorite sayings in the security business was, “If you build an environment that is crunchy on the outside and soft on the inside, you’re safe.” That whole concept has changed because of the way business processes have changed.


Because of the vast amount of Internet usage, the ability to bring something bad into your environment without the user knowing it is tremendous. As an IT security professional, you now have to worry about things like your standard user with computer access to the Internet and about them being subject to a phishing email attack; that can wreak havoc in your environment.


Q: WHAT SHOULD ORGANIZATIONS DO IN LIGHT OF EVOLVING THREATS?


A: The cyber criminals out there are always trying to keep several steps ahead of any type of protection strategy. Organizations need to be worried about the full threat lifecycle. At PC Connection, Inc. we focus on the concept of protection, detection, and reaction.


It’s a strategy to make sure that you’re covering all three of those very critical pillars. This includes your information, your assets and your people, the ability to detect when bad things may be going wrong, and most importantly, the capability to react in a very well-organized, structured, and sophisticated way to counteract these threats.


Q: WHERE DO YOU SEE THE MOST COMMON SECURITY MISSTEPS?


LISTEN TO THE THE FULL PODCAST Building a Rock Solid Secuirty Plan


www.pcconnection.com/rocksolidsecurity


Call an Account Manager to learn more today.


18 CONNECTION/HEALTHCARE IT 2014.Q3


A: Many IT folks are in a “set it and forget it” protection mode. They buy technology and put it in their environment, and by doing that, they think they are safe. They ignore the detection and reaction pieces, which require constant vigilance—always worrying about what’s going on in your environment— and the ability to react to things that may be indicators of compromise in your environment. These are signifi cant components to making sure that organizations remain safe and secure over the entire threat lifecycle.


?


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36