Axiad IDS, Inc.

Blogs

Axiad Blog Posts

November blog_postcard.png

LET’S TALK - Weighing the risks of data protection in today’s complex, digital world

In recent conversations with enterprise customers, including healthcare and pharmaceutical leaders, there has been a reoccurring theme - data protection is complex - no matter the industry. When discussing data protection, authentication typically is the first criteria that comes to mind. Yes, authentication is critical to identifying “who” is accessing “what” in your organization. But protecting your privileged data through secure communications takes more than authentication…

 
BLOG_PRIVILEGED_POSTCARD.png

LET’S TALK - Who is a privileged user, really? You may be surprised by the answer

Imagine if one of your HR employees were to reveal sensitive information about salaries or litigation facing your enterprise in an email to the wrong person.  Think about a marketing manager who has access to the company’s social media channels, putting the enterprise at risk with a single racist remark. Or consider R&D professionals who have access to and exchange information about medicines being developed, FDA reports or clinical trials. What if their private digital conversations were breached…

 
Blog5_postcard.png

Let's Talk - Managing the Complexities of Cybersecurity — We’ve Got Your Back

You can’t scan the morning news without finding a story about the latest cybersecurity threat. The good news: there are a lot of smart people working to make sure technology keeps pace — making it more and more difficult for the bad guys to breach your data. The bad news: new cybersecurity technologies are complex and the talent required to manage these security solutions is scarce. According to a March 2017 Forbes article*, the ISACA, a non-profit information security advocacy group, predicts there will be a global shortage of two million cybersecurity professionals by 2019....

 
Blog4_postcard.png

Real Life - Mobile EVERYTHING but with some caveats

Today our mobile devices are an intricate part of our everyday life. If I accidentally drive away from my home without my cell phone — I will turn around and go back for it even if it means I’m going to be late for my next appointment. Just like most of you, I no longer memorize phone numbers and other contact information because it is stored in my cell phone. Same with my calendar,  I organize my day via the calendar on my cell phone which in turn syncs with my work computer. This said there are limits to what I will and won’t carry (for the company) on my personal mobile device. This months blog explores this reality recognizing mobile EVERYTHING is on the rise, but highlights just one example as to why mobile phones — while prevalent — won’t work in every situation. Imagine being a CIO or CSO or IT manager trying to figure out how to securely operate and manage an enterprise with all of these variable situations...

 
Blog3_postcard.png

Real Life: WHY Good Cybersecurity Practices Matter — in the Office and On-the-Road

This month’s blog gets real. I usually try not to mix my work life with my personal life but sometimes the two become unexpectedly intertwined. This was the case when my car was broken into just after the the first of the year. My laptop and phone were stolen and for the first time since working at Axiad IDS, I put our security solutions and amazing security team to the test… 

 
Blog2_postcard_B.png

LETS TALK! This years DATA BREACHES EXTENDED TO YOU AND ME – THE CONSUMERS WHO TRUSTED ORGANIZATIONS TO PROTECT OUR DATA

In this role, I’ve observed an interesting (and worrisome) trend. No longer do attackers exclusively target the business operations of corporations. In 2017 we increasingly witnessed and felt the impact of cyber attacks on consumers. Why is it important to be aware of these risks? Well there are a couple of reasons. One, knowing the increased risk as consumers, we need to demand that the organizations we give our business take the precautionary measures required to protect our personal data...

 
Blog1_postcard.png

Let's talk! A new blog series from Axiad IDS. First post featuring the looming deadline to comply with NIST SP800-171

I looked at the calendar this morning and thought, it’s time for me to make some noise! For months (actually this entire year), I’ve been informing customers about the looming deadline to comply with NIST Special Publication 800-171.  It is now the end of November and it’s all getting very real — just one short month until the December 2017 deadline...