News Coverage

The franchise security wake-up call

— Recent headlines illustrate that the slew of retail data breaches continue, and are unlikely to abate in the near future. Among the latest news items, the Payment Card Industry Security Standards Council issued a bulletin advising retailers to review security controls to ensure protection against Backoff malware, and Krebs on Security reported a possible Dairy Queen breach at a number of stores in several states. While the latter event has yet to be confirmed, it sheds light on a key security challenge of the franchise model. Full Story

Securing 3rd Party Access

— Donald Rumsfeld provided a famous quote regarding problems of which we are aware: “There are known unknowns. That is to say there are things that we now know we don't know. But there are also unknown unknowns. There are things we do not know we don't know. So … we do the best we can and we pull all this information together.” In IT security, there are constant challenges, such as hackers, insider threats and malware. However, these fall into the bucket of ‘known unknowns,’ in that you should be aware of the general risks and have taken steps to prevent them. Full Story

What’s that Plumber Doing in the Bedroom?

— The increasing sophistication of technology makes it hard for IT professionals to keep up and be experts in all things technology. From monolithic central IT systems through to new and distributed computing models, it’s harder—and often more expensive—to manage and support everything internally. As such, more outsourcing and use of third-party service providers is taking place. An Ovum research study in late 2013 found that 88 per cent of companies surveyed in Western Europe allowed at least one third party access their network remotely. For one of those businesses surveyed, more than 100 outside companies had access to their IT network. Full Story

Remote access and best practice

— A spate of new and updated malware attacks has been uncovered from Backoff, which targets point-of-sale terminals to a new version of Citadel that goes after more traditional PCs and laptops. What links all these attacks is the use of unsecured remote access technologies to gain initial access to the systems. Many IT professionals and third-party vendors rely on remote access tools to do their jobs. These are the tools they use to manage, update and troubleshoot systems at a distance. Full Story

Efficiency and Security Gains Through Remote Access

— The IT environment in today’s financial services industry has become highly distributed, with branch offices and remote workers spread across thousands of miles and systems ranging from servers to mobile devices to kiosks. This can be a tricky environment for any organization to manage, but credit unions often face additional challenges. Unlike their larger counterparts, many of them have limited resources that can only support a small IT staff. Full Story

TECH 21 — Mississippi’s most wanted in technology

— Joel Bomgar’s creation, the Bomgar Box, enables support pros to securely access and control remote computer systems and devices anywhere in the world. At 23, Bomgar founded the company in 2003. Today, it has more than 8,000 customers and annual sales revenue of more than $50 million. Bomgar employs more than 200 people, most in Ridgeland. Full Story

Remote support products meet government security needs

— Bomgar’s appliance-based remote support software enables users to remotely access and fix nearly any IT device that is located just about anywhere. According to Scott Braynard, who is vice president of public sector at Jackson, Miss.-based Bomgar, his firm’s software is built specifically for remote support and offers an extra layer of security to safeguard support sessions. “It is feature-rich for both support desks and service desks,” he says. Full Story

Ensuring Security And Compliance In An Era Of Connected Health

— In the healthcare industry, concerns over protecting sensitive patient data are heightened as organizations introduce more Internet-connected devices and deploy cloud environments to store and manage information. As these devices share more data across networks, IT professionals and medical device designers are faced with the challenge of how to keep this data secure. Full Story

The Top 9 Most Secure Remote PC Access Software of 2014

— Remote access to PCs has long been a tricky IT staple. On the one hand, gaining authorized control to your device and its files is a great thing, allowing for users to have quick access to their most essential electronic items. But on the other hand, this convenience has become a bigger and bigger concern for sophisticated hackers and the infiltration techniques they employ to gain access to your devices. Now, the best remote PC access software isn't just the one with the most features; rather, it's the one that's the most difficult for an unauthorized user to breach. Full Story

How to Reduce ‘Tech Effort’ in Support Centers

— Resolving customer issues quickly and during the first interaction takes effort. It involves creating the right culture, integrating new technologies and improving processes. Market leaders are dedicating huge sums of money to enhance their customer support or acquiring companies with proven support technology to reach these goals. IBM's report,“The Customer-activated Enterprise,” surveyed more than 4,000 executives and came away with three common themes: companies want to be more open to customer influence, pioneer digital-physical innovation and craft engaging customer experiences. All three themes can be seen across the tech support industry. Customers want their tech issues resolved quickly, and in the communication style and channel they choose. Full Story

Page 2 of 44 pages: 1 2 3 4 Last
| Senior Director of Public Relations Bomgar Corporation