Press Coverage

Who Watches the Watchers when You Outsource?

— A January 2015 study by PAC found that 79% of companies outsource all or part of their cybersecurity operations. While outsourcing can take away some of the pressures, responsibility for maintaining IT security can never be fully outsourced. It’s important to consider qui custodiet ipsos custodes, or ‘who watches the watchers?’ Should a data loss occur, the breached company holds the ultimate responsibility, whether their security infrastructure is managed in-house or externally. Full Story

Customer service: the rise of the mix and match approach

— Everyone’s familiar with the mantra ‘the customer is always right’. However, treating customers right across every support channel can be difficult as there are more interaction options available today, from phone and email through to chat and social media. Full Story

Protect Yourself

— Cybercrime isn't just the stuff of sci-fi; it can have a devastating impact on your business. Last year the accountancy firm PwC found that almost 70% of UK firms experience an incident in 2014, which is higher than the global average. This coincides with some very high-profile data breaches. American retailer Target experience something of a nightmare before Christmas in 2013 when a spill of information belonging to 70 million customers led to losses upwards of $148m. Similar incidents occurred with Office and Home Depot and they are by no means isolated incidents - we just don't always hear about them. This is also a massive problem in the UK and small companies bear the brunt, making up 85.7% of hacking incidents. Full Story

Six ways to create better IT metrics

— The IT organisation is moving beyond simply being a provider of services to the rest of the business, it is expected to work closely with the business in delivering maximum returns. In order to show how IT is benefitting business, metrics are needed to gauge costs, efficiency, productivity and performance. Here are six issues that CIOs should concentrate on. Full Story

The Third-Party Threat: Are You Safe?

— Scott Braynard, VP of Public Sector for Bomgar, a remote support solutions provider that has been making inroads into the access management market, has an article out on Government Technology, a web news site dedicated to IT’s role in state and local governments that is worth your time. Scott has some advice for those concerned (and those who are not, because they should be) with recent public sector data breaches and are afraid the same thing could happen to them. Full Story

Are You Safe from the Third-Party Threat? (Industry Perspective)

— The White House. USPS. HealthCare.gov. The list of federal entities that are victims of data breaches grows seemingly every day, raising fears among government IT professionals about threats to IT infrastructure and how to best protect data. The reality is there is no single solution, and like businesses, government bodies should expect that breaches will happen. Instead IT should take a layered approach to security, leveraging a combination of proven technologies and best practices, which includes preventative measures to increase controls over privileged access and help protect the network. Full Story

Massive cyber-attack: what businesses can learn from major data breaches

— Stuart Facey, International Vice President at Bomgar, says that when implemented and managed properly, remote access is secure. "The recent changes in PCI DSS 3.0 compliance reinforces some key guidelines to ensure that third-party access is as secure as internal network security. This change also makes it clear that responsibility for security remains with the retailer, rather than only being on the outsourcer," he says. Full Story

Protect Your Practice Data Against a Breach

— Technology has changed the face of patient care. But it has also opened a Pandora's Box of lurid and potentially expensive data breaches. Don't be lulled into a false sense of security because you may think your practice is too small to be a target for hackers. The lessons for large health systems are as relevant as those for small, independent practices. Data security can't be left to chance. Full Story

Multimedia-based multichannel CRM still faces uphill battle

— Customer service used to be straightforward: People called companies on the phone when they had a question, issue or complaint. Email added a second layer to customer relationship management (CRM) which further diversified communication. Full Story

Don’t Backoff: nail down your remote access policy or face the music

— Remote access and security worries go hand in hand, and last year, we saw the likes of the Backoff malware targeting point-of-sale terminals, and updated Citadel malware, both leveraging unsecured remote access systems to gain access to networks. Full Story

Page 1 of 47 pages: 123 Last
| Senior Director of Public Relations Bomgar Corporation

770.407.1876