SECURITY SOLUTIONS
SERVICES
PREEMPTIVE PROTECTION
Connect with Experts
Security threats are more of a problem for today’s organizations than ever before. Not only are they increasing in sophistication and frequency, but they also have a whole host of targets: everything from traditional desktop PCs to smartphones and tablets to Web apps. Attackers use many of these gateways— and more—to gain access to mission- critical information.
In this edition of Connect with Experts, Steve Nardone, Security Practice Director with PC Connection, talks about the Security Services and Solutions offered by PC Connection. He discusses how to develop and implement a rock-solid security management plan, and how the right IT partner can help protect your customer's valuable assets.
Building a Rock-Solid Security Management Plan
Q: YOU’VE COVERED SECURITY FOR A LONG TIME. WHAT CHANGES HAVE YOU SEEN?
A: IT security has changed radically in the area of threats and attacks. I’ve been in the business for 34 years, and I started my career working in the intelligence community. I’ve seen about
everything you can expect to encounter in the security business. The whole threat landscape has changed dramatically over the last three to five years.
? Q: WHAT ARE THE TOP SECURITY THREATS FACING ORGANIZATIONS TODAY?
A: One of our favorite sayings in the security business was, “If you build an environment that is crunchy on the outside and soft on the inside, you’re safe.” That whole concept has changed because of the way business processes have changed.
Because of the vast amount of Internet usage, the ability to bring something bad into your environment without the user knowing it is tremendous. As an IT security professional, you now have to worry about things like your standard user with computer access to the Internet and about them being subject to a phishing email attack; that can wreak havoc in your environment.
Q: WHAT SHOULD ORGANIZATIONS DO IN LIGHT OF EVOLVING THREATS?
A: The cyber criminals out there are always trying to keep several steps ahead of any type of protection strategy. Organizations need to be worried about the full threat lifecycle. At PC Connection, we focus on the concept of protection, detection, and reaction.
It’s a strategy to make sure that you’re covering all three of those very critical pillars. This includes your information, your assets and your people, the ability to detect when bad things may be going wrong, and most importantly, the capability to react in a very well-organized, structured, and sophisticated way to counteract these threats.
RESOURCES:
LISTEN TO THE THE FULL PODCAST Building a Rock Solid Secuirty Plan
www.pcconnection.com/rocksolidsecurity Q: WHERE DO YOU SEE THE MOST COMMON SECURITY MISSTEPS?
A: Many companies are in a “set it and forget it” protection mode. They buy technology and put it in their environment, and by doing that, they think they are safe. They ignore the detection and reaction pieces, which require constant vigilance—always worrying about what’s going on in your environment—and the ability to react to things that may be indicators of compromise in your
34 Solutions and Services Playbook INTERNAL USE ONLY #8277 0315
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78 |
Page 79 |
Page 80 |
Page 81 |
Page 82 |
Page 83 |
Page 84 |
Page 85 |
Page 86 |
Page 87 |
Page 88