Posts By Brian Reynolds

Dec 22, 2015 By Brian Reynolds In Blog

‘Tis to the Season: Give Your Family the Gift of Security

The holidays are upon us.  It really is the most wonderful time of the year.  I don’t know about you, but I for one love giving gifts, especially to my children and other family members.  Nothing is more thrilling than watching their excitement. I still remember the birthday dinner for my oldest son when he turned 13 years old and got his...

Read More

Dec 02, 2015 By Brian Reynolds In Blog

OPM Information Breach - "Fed Up!"

I recently received a USPS-delivered “official business” letter from the US Office of Personnel Management regarding last summer’s cyber security breach at the agency. The letter began, “As you may know, the Office of Personnel Management (OPM) was the target of a malicious cyber intrusion carried out against the US Government, which...

Read More

Sep 15, 2015 By Brian Reynolds In Blog

Cyber Security is also Physical Security

The IP-enablement of physical devices is increasing in both the private and public sectors. Physical devices such as those that control access to buildings, air conditioning, and even soda dispensing machines are now controlled via an organization’s IT network. The IP-enablement of physical devices, which is intended to increase operational...

Read More

Aug 19, 2015 By Brian Reynolds In Blog

Bombshell! Cyber breaches more widespread than reported

A bombshell is defined as “an overwhelming surprise or disappointment.” For example, you open the paper one day and read that your next-door neighbor is an escaped serial killer. That’s a bombshell. A well-known politician is charged with bigamy. That’s a bombshell. On several occasions over the last several years, high-profile cyber...

Read More

Jul 07, 2015 By Brian Reynolds In Blog

Simple, Proven and Secure Cloud Backup

In a world where plucking low hanging fruit for cost savings is king,  cloud and backup go hand-in-hand.  It feels like a safe place to start when not touching production services or data sets and when dealing with the recurring costs and maintenance required for on-premise data protection solutions. It feels safe, that is, until you start...

Read More

Apr 15, 2015 By Brian Reynolds In Blog

Insider data breaches: Whose responsibility is it? (Part 2)

In Part 1 of this blog, we discussed the critical nature of the insider data breach as well as its distinct origins.  We left it in a very scary place, a place where most corporations and agencies find themselves today.  Security teams and data teams don’t have the answers or the ownership to address this problem head on. So we return to...

Read More

Apr 02, 2015 By Brian Reynolds In Blog

Insider data breaches: Whose responsibility is it? (Part 1)

Insider data breaches have become a serious cyber threat that every member of the IT community should be paying attention to.  You don’t have to look very far to learn about these breaches and the damage they have caused.  It is all over the news. The harm to A company or agency name—or even to an entire industry—can be difficult to...

Read More

Feb 25, 2015 By Brian Reynolds In Blog

Cyber Shelfware

Shelfware.  Noun, informal.  1.  Computers.  software or hardware that remains unsold, unused, or underused. /shelfweir/ Software which is never used and so ends up on the shelf. Shelfware may be purchased on a whim by an individual or group, or in accordance with corporate policy, but not actually required for any particular use. One of my...

Read More