10 people who are your top security risks

— For many organizations, the greatest risks to data security are found on the inside. Prime suspects are employees and contractors with “privileged user” access. Here’s a rundown from security firm Bomgar on employees healthcare organizations have who could be the weakest links in your security. Full Story

10 People In Your Organization That Are Your Top Security Risks

— For many organizations, the greatest risks to data security are found on the inside. Prime suspects are employees and contractors with ‘privileged user’ access. Here’s a rundown on the employees that could be the weakest links in your security. Full Story

Privileged Identity Management for the Extended Enterprise

— The information security battleground is quickly moving inside the network. Given that the majority of data breaches are now being caused by insiders, most organizations recognize the importance of privileged identity management. But what about third parties? Third parties such as contractors, business partners and vendors are an important part of any organization’s IT ecosystem today. Full Story

How the Internet of Things is impacting enterprise networks

— In the past ten years, there has been a complete shift in the way companies manage, secure and invest in their networks. The increase in the number of mobile devices that could connect to the internet drove significant demand for Wi-Fi in the workplace. This led to an increase in the number of Wi-Fi devices at the network edge and, as a consequence, more network traffic across the core. Full Story

6 ed tech products to note from Educause 2016

— Between keynotes, panels and interviews, Education Dive took time to check out what Educause 2016's close to 300 exhibitors had on display. From solutions for boosting cybersecurity to new accessibility components on familiar platforms, here are six products we saw worth noting. Full Story

Time to reduce the hacker threat

— From Target, eBay and TalkTalk, to this year’s Oracle data breach, it has become increasingly common for big retailers and brands to be victims of large security incidents, writes Stuart Facey, VP of EMEA at the secure access software company Bomgar. Full Story

Costly connections

— Before many businesses have even got to grips with mobile, the more proactive companies are preparing for the connected age. So what will be the impact of the Internet of Things on the enterprise network? Full Story

IoT security: job for PAM

— William Culbert, Director of Solutions Engineering, EMEA at the access software company Bomgar explains why an access management strategy is the lynchpin to IoT enterprise security. Full Story

Air Liquide achieves secure, remote support

— You can't be everywhere at once—especially when it comes to managing widely scattered process units—but you can get close. But while a good remote support solution can provide access and interaction almost anywhere, the crucial trick is doing it securely, according to Arnold "Marty" Martin, control system manager at Air Liquide in Houston, which oversees hundreds of the firm's air-separation and other U.S. production plants. Full Story

Bomgar used for Manchester NHS IT support

— The NHS Greater Manchester Shared Services has picked Bomgar to handle IT support services for its wide range of trusts and CCGs across the Greater Manchester region. Full Story

Elizabeth Hulsey | Public Relations Specialist Bomgar Corporation

770.407.1812