Interview: William Culbert, Director of Solutions Engineering, Bomgar

— If there’s one key lesson to take away from 2016 it’s that, in a relatively short period of time, the healthcare sector has become one the most highly-targeted industries by cyber-criminals seeking to get hold of sensitive and personal data. As the year progressed we saw a raft of ransomware attacks on the NHS and medical practices across the globe, with some hospitals forced to cancel appointments and operations as a result of their files and information being locked down. Full Story

How to secure your service desk

— Scott Walker’s time as a service desk support engineer has given him first-hand experience dealing with IT support challenges. Now working for Bomgar, Scott explains his perspective on how the service desk can stay secure without slowing the team. Full Story

A Look Ahead at 2017: 2017 security predictions

— From W-2 scams to WordPress vulnerabilities, ransomware, business email compromises, DDos attacks and allegations of a hacked presidential election -- 2016's been a hell of a year in cybersecurity, and it's not over yet. There's no reason to believe 2017 will be any better. If anything, it could be even worse as cybercriminals continue to push social engineering, find new ways to deliver malware, crack vulnerable databases and leverage mobile technology to find ways to get inside corporate defenses and target individuals. Full Story

2017 security predictions

— From W-2 scams to WordPress vulnerabilities, ransomware, business email compromises, DDos attacks and allegations of a hacked presidential election -- 2016's been a hell of a year in cybersecurity, and it's not over yet. There's no reason to believe 2017 will be any better. If anything, it could be even worse as cybercriminals continue to push social engineering, find new ways to deliver malware, crack vulnerable databases and leverage mobile technology to find ways to get inside corporate defenses and target individuals. Full Story

10 people who are your top security risks

— For many organizations, the greatest risks to data security are found on the inside. Prime suspects are employees and contractors with “privileged user” access. Here’s a rundown from security firm Bomgar on employees healthcare organizations have who could be the weakest links in your security. Full Story

10 People In Your Organization That Are Your Top Security Risks

— For many organizations, the greatest risks to data security are found on the inside. Prime suspects are employees and contractors with ‘privileged user’ access. Here’s a rundown on the employees that could be the weakest links in your security. Full Story

Privileged Identity Management for the Extended Enterprise

— The information security battleground is quickly moving inside the network. Given that the majority of data breaches are now being caused by insiders, most organizations recognize the importance of privileged identity management. But what about third parties? Third parties such as contractors, business partners and vendors are an important part of any organization’s IT ecosystem today. Full Story

How the Internet of Things is impacting enterprise networks

— In the past ten years, there has been a complete shift in the way companies manage, secure and invest in their networks. The increase in the number of mobile devices that could connect to the internet drove significant demand for Wi-Fi in the workplace. This led to an increase in the number of Wi-Fi devices at the network edge and, as a consequence, more network traffic across the core. Full Story

6 ed tech products to note from Educause 2016

— Between keynotes, panels and interviews, Education Dive took time to check out what Educause 2016's close to 300 exhibitors had on display. From solutions for boosting cybersecurity to new accessibility components on familiar platforms, here are six products we saw worth noting. Full Story

Time to reduce the hacker threat

— From Target, eBay and TalkTalk, to this year’s Oracle data breach, it has become increasingly common for big retailers and brands to be victims of large security incidents, writes Stuart Facey, VP of EMEA at the secure access software company Bomgar. Full Story

Elizabeth Hulsey | Public Relations Specialist Bomgar Corporation

770.407.1812