Cartika Blog

IAAS, CLOUD, AND MANAGED SERVICES BLOG

Tag : Security

Regulatory Compliance and What it Means for IT Departments

Regulatory Compliance CartikaFor years, we have heard horror stories and read disturbing headlines about the exploitation and mismanagement of corporate and private data. Regulatory compliance has evolved as a result of these unfortunate events and now we must all deal with it.

Empower Employees Securely With A Mobile Virtual Private Network

VPN Security CartikaA few years ago, the enterprise was abuzz with concerns about the security implications of the use of mobile devices by employees. Many IT folks wanted to restrict the use of mobile devices over which they had little control. While the media embraced BYOD as the next big thing, those tasked with maintaining the security of corporate data were less enthusiastic.

Why Are Banks Still So Unprepared For The Cloud?

It’s something of a disconcerting statistic - fewer than one third of American financial organizations have a cloud strategy. Other regions don’t fare much better, either. EMEA shows 35% of firms preparing for cloud computing, while APAC is slightly higher, at 41%. Given the immense popularity of cloud computing in both enterprise and the consumer space, these statistics are troubling - even if they do show that more institutions are starting to realize the importance of going digital. What exactly is the root cause here? Why exactly are firms lagging behind to such a great degree? And more importantly, what can be done about it?

Why It’s High Time Healthcare Stopped Lagging Behind On Security

Last month, Anthem Incorporated - one of the world’s leading health insurance companies - made a very grim announcement to shareholders and clients. It was, a representative explained, the target of a “very sophisticated external cyberattack,” which allowed hackers to gain unauthorized access to its IT systems. The personal information of eighty million clients - data ranging from birthdays and names to medical IDs, social security numbers, street addresses, email addresses, and employment history - was compromised.