Author: Logicalis Staff

It’s Time to Consider CIS Controls for Your Enterprise Security

Reading Time: 3 minutesBy Ron Temske, Vice President of Security Solutions, Logicalis US In previous blog articles, I’ve mentioned the Center for Internet Security (CIS), a nonprofit that harnesses the power of the global IT community to safeguard private and public organizations against cyber threats. We think very highly of their approach to cybersecurity, so much so in fact, that Logicalis recently became an Organizational Consulting Member of CIS because we recognize that its approach to security aligns very tightly with our own and supports our values. Here’s why we find CIS important and I think that you will...

Read More

K-12 Digital Learning Framework in 2017

Reading Time: 2 minutesBy Adam Petrovsky, GovEd Practice Leader, Logicalis GovEd As K-12 students approach their end-of-year (around late May), teachers and staff are busy with exams, supervising end-of-school activities and packing up their classrooms.  Behind the scenes, however, school administrators are using the summer-break session for implementing innovative technologies, planning for next year’s initiatives and moving one step closer to a fully digital learning environment. This is a daunting task.  Each stage of the digital learning road-map is interdependent.  Network infrastructure, data center virtualization/convergence/hyperconvergence, voice/video readiness, cybersecurity management (including identity), pervasive Wi-Fi, and many other considerations, must be...

Read More

Enterprise Security Blog: Ransomware

Reading Time: 4 minutesBy Ron Temske, Vice President of Security Solutions, Logicalis US Recent large-scale ransomware attacks have placed a premium on information about ransomware and what you can do to best protect your organization. Please note – ransomware attacks continue to spread, even as this blog is published, so new information may expand on (or contradict) what’s noted below. This post is current as of May 15, 2017. The attack, known as WannaCry (and many variant names such as WannaCrypt, WannaCryptor, etc.) is a derivative of an attack named Wana Decryptor which was first detected in early May attacking several UK hospitals. It quickly spread and by mid-day Saturday, May 13, 2017, an estimated 126,000 systems in over 100 countries had been impacted by this attack. There have been similar notable ransomware attacks against the National Health Service in the UK, Telefonica in Spain and FedEx in the United States. The attacker is deploying common ransomware techniques of encrypting a hard drive and demanding payment ($300 USD worth of bitcoins in this case, with an escalating ransom if not paid promptly). The attack leverages a vulnerability in the Microsoft Windows Operating System, identified in Microsoft security bulletin MS17-010. The vulnerability affects the SMB service (Server Message Block) which is used for file, print and other services within Windows. Two exploits that take advantage of this vulnerability – DoublePulsar...

Read More

Five Critical Considerations in an Effective Telehealth Strategy

Reading Time: 3 minutesBy Ed Simcox, Healthcare Practice Leader, Logicalis Healthcare Solutions At Logicalis, we talk to a lot of healthcare CIOs and IT professionals.  And while the clear majority are thinking about and planning ways to optimize the significant investments their organizations have made in electronic health record (EHR) systems, they know they’re missing some pieces of the puzzle. Telehealth is one of those missing links. What few people are talking about today is the correlation between telehealth, smart image retention practices, and the optimization strategies that can maximize their returns on EHR investments. Making telehealth a more...

Read More

Four Reasons to Consider a FlexPod Refresh

Reading Time: 3 minutesBy Brad Bailie, Senior Solutions Architect, Logicalis US Your CEO has probably already asked you how your compute systems can help the organization be more nimble, adapting to changes and market forces more quickly. And, as you continue your path toward digital transformation, user expectations for enterprise IT rival the performance requirements they have for their outside-of-work lives.  It’s a tall order – and thankfully, there are ways to meet it. The need to be nimble and agile, to provide increased performance at a decreased cost – these are all reasons IT experts were excited from...

Read More

The Importance of Multi-Factor Authentication

Reading Time: 2 minutesBy Ron Temske, Vice President of Security Solutions, Logicalis US In this article, I want to talk about the importance of Multi-Factor Authentication (MFA) when it comes to providing a comprehensive enterprise security strategy. I’ll provide a brief overview of the technology, discuss why it’s so important and then identify some solutions in this space. First, the idea of authentication is one that most of us understand. Put simply it’s a method for validating that we are who we say we are. Almost all modern systems provide access based on an authenticated user identity, so getting...

Read More

Taking a Threat-Centric Approach to Security

Reading Time: 2 minutesBy Ron Temske, Vice President of Security Solutions, Logicalis US In an earlier article, Back to Basics: Risk-Centric Security Strategy  we discussed a Risk-Centric approach to enterprise security. Briefly, a Risk-Centric Approach to Security is very process-oriented. We discussed the steps used in identifying assets to protect and the level of risk assigned to these assets. Today, I want to take a look at a Threat-Centric Approach to Security. The first thing to understand is that the two approaches are complementary and, in an ideal world, your organization might pursue both a Risk-Centric Approach (RCA) AND...

Read More

Back to Basics: Risk-Centric Security Strategy

Reading Time: 4 minutesBy Ron Temske, Vice President of Security Solutions, Logicalis US In past articles, I’ve focused on specific enterprise security solutions, such as virtual private networks (VPN), next generation firewalls (NGFW), and Secure DNS, but I think it would be helpful to talk about a risk-centric or risk-based security strategy to provide some insight into how many companies are (or should be) looking at enterprise security and how they prioritize security projects. What we want to do for any enterprise security scenario is take a series of steps that form a risk-based security strategy. I’ll outline the...

Read More

How to Benchmark Your Enterprise Security Using the Critical Security Controls Framework

Reading Time: 3 minutesBy Ron Temske, Vice President of Security Solutions, Logicalis US In an earlier blog post, I discussed the importance of a Common Security Framework (CSF) to enterprise security https://logicalisinsights.com/2017/04/07/what-is-a-common-security-framework-csf/ . In this blog post, I want to dive a little deeper into one specific framework – the SANS 20 / CIS 20 Critical Security Controls (CSC) security framework. CIS stands for Center for Internet Security (www.cisecurity.org) which is a non-profit that leverages the global IT community to safeguard private and public organizations against cyber threats. CIS has no corporate affiliations or ties that would create any conflicts...

Read More

Join Our Mailing List

Receive our latest thought leadership pieces, including our Logicalis Insights blog posts!

Pick a Topic

CONTACT US

Want to learn more about Logicalis?

Click here to contact us.