Digital Transformation. Just two words. By themselves they are interesting. Put them together and they speak to something much more powerful. Those two words put together, “Digital” + “Transformation” = “Digital Transformation”, are driving change like we haven’t seen in a long time.Read More
One of my favourite cult classic movies was an obscure, but star studded picture called Mars Attacks. In the movie, Jack Nicholson plays the President of the United States trying to make peace with the vicious Martians. In his final scene, he makes an impassioned speech to the Martian leader with his final line being “why can’t we all just get along?” The Martian leader’s response was a tear and an “Ack-Ack,” followed by killing President Jack.
This scene is all too often paralleled in real life, with the opposing roles played by Security and IT. While they may not vaporize each other, they do operate under diametrically opposed missions. Security’s job is to keep the company safe – full stop. If they had their way, access to systems would be very tightly controlled and an almost weekly patching routine would be implemented, slowing the enterprise to a crawl. IT on the other hand is tasked with keeping the company up and running. They view patching as a necessary evil that consumes precious time and resources that they could focus on more innovative projects.
Recent high profile cyber threats have raised the public’s awareness of vulnerability management to new heights. With the recent WannaCry threat, we learned first-hand the dangers un-patched infrastructure can have in your environment. From hospitals, to financial institutions, and critical government services, no industry or country was left unscathed.Read More
When an Asset Becomes a Liability – Part 2: Uptime is Important, but Insecure Uptime May Be a Liability
A note from the author: As I talk to more and more organizations a new challenge is emerging: balancing the need to be secure and the need have systems operational. I’ve written this blog post from an internal perspective (CEO) to provide an “insider” view on the problem. While not meant to describe operations at any firm specifically, the challenges identified and the solutions required to resolve them are real and attainable with the right team and the right skills.Read More
Data breaches can be very costly and are unfortunately becoming a common trend in the news. Not only do they cost companies millions of dollars in fines, but they can cost enough reputational damage to jeopardize sales. A recent article on Bloomberg.com discusses how last year’s security breach of Yahoo! Inc. forced the company to drop their sale price to Verizon by $350 million dollars. There would likely be additional costs incurred to resolve the issue itself and repair any damage to the brand image. The article even goes on to say that Verizon, at one point, considered cancelling the purchase of Yahoo! Inc. altogether.Read More
In my last blog (which you can read here), I discussed the hacking of Casino Rama and how this may have been caused by something called the Ostrich Effect. To review, the Ostrich Effect occurs when an organization knows they have a security risk but is unable to remediate the threat, often due to the cost and effort required for remediation.Read More
Companies bury their heads instead of tackling vulnerability remediation
In November 2016, Casino Rama made Canadian news headlines after being hacked and having massive amounts of employee, vendor, and client data stolen.
Casino Rama is a large Canadian casino and is a joint venture between First Nations, commercial operators Penn National Gaming, and the Ontario Lottery and Gaming Corporation. It is Ontario's only First Nations "commercial casino" and the largest First Nations casino in Canada.Read More
Online is proud to be an AppDynamics AppSphere partner. If you are new to the application performance monitoring discussion, AppDynamics is the place to start. AppDynamics gathers all the information you need about the performance of your systems and processes and puts it into the real-time context of your critical business services – it works (and its very cool).Read More
Most organizations have invested in some form of IT service management (ITSM) solution, like the BMC ITSM product suite or ServiceNow. These tools enable organizations to be more effective because they help save time and money by automating tasks that would normally require hours of manual work by your employees.
But if you’re using BMC or ServiceNow already, you knew all that.
The same tools that help you manage and deliver IT services can be used to save your organization money, without investing in any new products. Leveraging your ITSM investment can provide significant improvements and savings - some of these efficiencies are intuitive, but others you may have never considered before.Read More
Service Management projects can have great results when the solution is defined parallel to the process implementation plan. At Online, we believe there are many factors that can influence how successful a project will be. Here are the top three factors for implementing a successful Service Management solution.Read More