Enterprise Services Blog
Get the latest thought leadership and information about the role of Enterprise Services in an increasingly interconnected world at HP Communities.

Cloud computing, Knowledge Management, Apps Modernization – Around Enterprise Services, Oct 12

By Alison Watterson, Enterprise Services Global Marketing

 

HPES Summary.jpgHere is a summary of the Enterprise Services blog topics for this past week:

 

  • Issues confronting contact centers are a mix of both the old and new
  • Cloud Computing -- CIO Challenges and Opportunities: HP Enterprise Services Twitter Chat
  • Debunking the 3 Myths of Knowledge Management – Part 2
  • Do you have the right test environment for cloud computing? 
  • Visit a Digital Hospital in action in Oslo, Norway
  • Business Transformation insights: When being right can start out wrong
  • Top 3 challenges in SAP HANA Implementations
  • Have you seen your cloud computing job description lately?
  • The storytelling goes on
  • Cybercrime Costs and Attack Frequency Rise for the third straight year
  • Application Modernization as Technical Debt
  • HP and United Airlines worked to integrate the passenger service systems for United and Continental
  • From Reporting the Past to Predicting the Future: Analytics in Finance and Accounting

What’s IT security’s weakest link? You might be surprised at the answer

blue hallway.jpg

By John Diamant, Distinguished Technologist, HP Enterprise Services

 

Has the IT security industry failed to learn the critical lesson of quality assurance history? Innovation INSIGHT contributor and HP Enterprise Services Distinguished Technologist John Diamant says the answer is a resounding yes. He explains why applications are compromising enterprise security.

Your organization MUST have a mobile device strategy!

Today’s workforce is more mobile than ever.  Where, when, and how we work has changed dramatically in recent years, thanks in large part to the use of Smart phones.  According to a recent poll by Courion, 69% of enterprises say employees are connecting personal mobile devices to the corporate network but more than one in five organizations does not have a policy in place to govern this use.

 

The practical reality is that the number of employee-owned smartphones and tablets in the work place is only going to go up, and IT needs to have a mobile device strategy that will both maximize employee productivity while mitigating security risks.

Your imaging and printing environment may put sensitive data at risk

Last year Affinity Health Plan had to notify more than 409,000 customers, clinicians, employees, job applicants and others about a breach related to personal information stored on the hard drives of copiers it returned to a leasing company.     Hard drives aren’t the only risk -- A financial institution reported an unauthorized employee was able to examine sensitive IPO information sitting in the output tray at the printer near his desk --- and publicly shared it.  That resulted in an estimated $7 million loss. 

 

While security risks from networked printers are nothing new, they do represent an often unrecognized security risk.  How do you assess whether your environment is properly protected?  The first step is to understand the six imaging and printing vulnerability points:

Search
Follow Us


About the Author(s)
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation