News Coverage

Outsourced tech support model continues to grow

— When multibillion dollar hedge fund Pequot Capital Management announced in 2009 it would close its doors at the end of that year, some senior members of the IT department were faced with decisions on the next step in their careers. "We had time to decide our next-step career-wise, so three of us got together and announced we were going to start SoundView," says Bill McGee, managing partner at SoundView IT Solutions, an outsource IT company. Full Story

Government Office/IT

— With Bomgar 14.2 software, technology support professionals can access and fix nearly any system or device, located anywhere in the world. The product enables remote access to desktops and laptops, to servers and switches, to smartphones and tablets. Full Story

The “Third Party” Threat In Your Retail Model

— Recently, I participated in an online chat with Solution Providers for Retail’s readers. The discussion focused on POS systems and network security challenges that retailers are facing. Previously, in my blog, Is Your POS Environment Secure?, I shared a few concerns that retailers should be aware of so as to not inadvertently allow hackers to access to their network. In this post I want to highlight some of the larger security challenges that vendors are facing, particularly within a franchise structure. The franchise model is unique as it undercuts many of the security best practices that larger enterprises often implement. Franchise locations represent the bigger business brand, but often manage their own technology operations and costs separately from the brand itself. Though the corporate entity may suggest a set of security guidelines, it is ultimately up to the franchise owner whether they will follow those recommendations. In this scenario, even those vendors with the most rigid policies and protocols are ultimately trusting the franchise to follow suit on its own accord. Full Story

Building a Foundation on Security and Compliance

— Recent high-profile security breaches in the retail, finance, and insurance industries underscore the need for organizations to keep data secure across a wide network of devices and systems accessed by customers, vendors, and remote workers. In the healthcare industry particularly, concerns over protecting sensitive patient data are heightened as organizations introduce more Internet-connected devices and deploy cloud environments to store and manage information. As these devices share more data across networks, IT professionals and medical device designers are faced with the challenge of how to keep this data secure. Medical devices, especially those that record patient data for remote-monitored outpatient care, must function as designed while adhering to FDA regulations and HIPAA laws governing privacy and security. Full Story

Why Bomgar’s remote support technology is finding appeal outside the enterprise

— Despite the deluge of coverage about cloud-based applications and services for small and midsize businesses (SMBs), not every small company is comfortable with the idea of operating in the cloud, especially in places where internet access isn't always reliable. Full Story

Restaurant chains possible victims of POS data breach

— Another day, another data breach, this time effecting yet unnamed restaurants in the northwestern United States. Information & Supplies, a Vancouver, Washington-based POS and security systems provider, recently notified restaurant customers of a remote-access compromise that may have exposed credit and debit card data from POS transactions between Feb. 28 and April 18. Full Story

New products of the week 06.16.14

— 14.2 allows IT better control of who can remotely access which systems, when and from where, featuring new Wake on LAN support and Rep Console Device Verification for additional security. Full Story

What Should MSPs Expect From Bomgar 14.2?

— Bomgar has released a new version of its enterprise remote support solution. Bomgar 14.2 adds security improvements, better support for managing workflows and improvements to increase technician productivity, the company said. Here are the details. More granular security in the newest version enables more control over remote access to systems -- something that might have prevented an issue like last year's data breach of Target stores. The system can enable administrators to limit access to specific systems and set time parameters around when the access can be used, the company said. Full Story

How to manage third-party service, support and security

— Productivity expert David Allen once stated that his approach, “Getting Things Done,” was based on the simple premise that you can’t do everything. In IT, we face this problem every day. Whether it is due to lack of domain specific expertise or simply not enough resources to handle all of our IT services, there are many reasons why we might look to third parties to help support our requirements. Full Story

20 Real-World IT Cost-Cutting Mistakes You Need to Avoid

— “Do more with less” has become the IT department’s least appreciated mantra. Demands on IT are exploding, but spending on IT don’t follow suit. All companies have budgets and often the IT department, which is seen as a cost center (not rightfully), is given the charge to cut back. The stress to cut costs in IT can cause managers to make a lot of really foolish mistakes which can be far more costly in terms of lost dollars and lost business opportunities. I reached out to dozens of industry experts and asked, “What are the worst IT cost-cutting mistakes?” Full Story

Page 3 of 44 pages: 1 2 3 4 5 Last
| Senior Director of Public Relations Bomgar Corporation