More Perspective

IGX Global UK Limited is a subsidiary of ePlus inc., a Delaware corporation, traded on NASDAQ GSM. ePlus is known for our engineering talent and rigor, and we employ many experts who have a keen pulse on the IT industry. From security, cloud, and storage to lifecycle and deployment services, our staff has a unique perspective. Read our thought leadership articles below.

  • Breach Series - Part Two: Cyber Criminals are Assaulting the Retail Sector—Don’t Be the Next Victim

    • ​Lee Waskevich
    • Aug 15, 2018
    Data breaches in the retail sector are well-known and widely covered by the media—we all remember hearing about Target, Home Depot, and TJ Maxx. But with recent breaches at Panera Bread and Hudson’s Bay Company (owners of Saks Fifth Avenue and Lord & Taylor), we see that retail will continue to be a popular and prevalent target for cyber thieves. To avoid becoming the next victim, you must remain diligent and take action now.
    Continue Reading >
  • Breach Series - Part One: Follow These Steps to Avoid Becoming a Victim to Ransomware

    • ​Lee Waskevich
    • Aug 8, 2018
    Ransomware attacks hit us hard in 2017. SamSam, WannaCry, NotPetya, and other variants infected computers around the world, locking up systems, disrupting operations, and of course, extorting large sums of money from victims
    Continue Reading >
  • Data Loss Prevention in Healthcare

    • George Pashardis
    • Aug 7, 2018
    As an industry with strict privacy and security regulations, healthcare is challenged to implement increased cybersecurity measures to mitigate current threats. Failure to protect confidential information can result in fines amounting to millions of dollars. So whether you’re an IT security professional or the CIO of a hospital, medical university, health clinic, insurance company or a third-party organization involved in the industry, a robust Data Loss Prevention strategy should be a critical part of your security program.
    Continue Reading >
  • What you need to know about social media and IT security

    • Justin Bodie
    • Jun 21, 2018
    With Facebook and data privacy in the news recently, it’s a great time to think about reviewing your social media presence. As you probably realize, everything you click on, like, or tweet is recorded. Assume it’s there forever, and the information could be made available to both authorized and unauthorized users or services.
    Continue Reading >
  • What I Learned at HIMSS18: The Hottest Topics in Healthcare IT

    • George Pashardis
    • Jun 13, 2018
    When you bring together more than 40,000 professionals, clinicians, executives and vendors from around the world, a massive amount of information gets shared. Too much to digest all at once. So in the three months since HIMSS18, I’ve taken time to really think about what I saw and heard.
    Continue Reading >
  • HX AIM: Quickly Getting Started with Deep Learning

    • Zeki Yasar
    • Jun 8, 2018
    With so many technologies and moving parts involved in a Deep Learning project, many times stitching these components together and other manual infrastructure work along the path of experimentation to consumption can create significant challenges.
    Continue Reading >
  • IoT & Consumer Gear Attacks on the Rise…

    • ​Lee Waskevich
    • May 30, 2018
    Imagine pulling an ordinary “average joe” off the street and placing him into an NFL playoff game. No football experience, no safety equipment, and no workout regime. What would you expect to happen? That’s about where we stand with the majority of our home internet gateways.
    Continue Reading >
  • How to Get Started with Identity and Access Management (IAM)

    • Marc Cohen
    • Apr 26, 2018
    Identity management is a fundamental part of an effective security program. And, given the risks out there, it’s essential for protecting your organization against today’s cyber threats.
    Continue Reading >
  • Tales from the Road: RSA 2018

    • Jason Nelson
    • Apr 23, 2018
    A few main themes emerged from this year’s RSA Conference. Let’s discuss.
    Continue Reading >
  • Deep Learning Is Ready for Broad Adoption

    • Zeki Yasar
    • Mar 27, 2018
    The concepts behind AI and Deep Learning are not new, but until recently the application of Artificial Neural Networks has been limited and impractical. What has changed over the past couple of years is we now have the data, use cases, Deep Learning software tools, and powerful, specialized hardware that allow for us to create AI applications never before possible.
    Continue Reading >
  • Using the CSC 3 Control to Secure Configurations for Hardware and Software

    • Russ Ortmann
    • Mar 26, 2018
    Freshly installed operating systems and network-connected devices, by default, are usually configured for ease of deployment and ease of use. This means that the security controls are set to the least restrictive settings to ensure users experience little to no issues deploying their products. While this is great from the deployment perspective, it is not so great from the security perspective. Default admin accounts, unused protocols, and unnecessary pre-installed software can all be exploited in their default configuration.
    Continue Reading >
  • Don’t get phished! Personal Online Identity Protection

    • Marc Cohen
    • Feb 22, 2018
    Keeping your account information secure is the vital first step to good security hygiene. Below are some easy steps that can help keep your accounts safe. Much of the advice applies to both employees in an organization as well as to individuals’ personal online security.
    Continue Reading >
  • New Technologies = New Data Risks

    • ePlus Digital Infrastructure Team
    • Feb 13, 2018
    Network endpoint growth is explosive due to the surge in mobility and Internet of Things (IoT) devices. In today’s always-on world, work/life lines have blurred thanks to smartphones, laptops, and other devices that can be used for work. Along the same lines, companies need to be able to host these devices — especially companies that have a bring-your-own-device (BYOD) policy — on their own networks and, in some situations, provide remote access, while keeping networks and data safe in the process.
    Continue Reading >
  • How Does Mobility Affect the Cloud?

    • ePlus Cloud Team
    • Feb 13, 2018
    Just because businesses are driven by mobile technology and the cloud doesn’t mean that every company can afford an extensive networking staff to support it. To meet escalating connectivity demands with limited resources, our team at ePlus recommends simplified, mobile-first network design that integrates advanced security and control from the start.
    Continue Reading >
  • Public vs. Private Clouds: Why Can’t You Have It All?

    • ePlus Cloud Team
    • Feb 13, 2018
    Today’s companies need the ability to accelerate application development in order to keep up with the competition. But that’s difficult to do with aging infrastructures filled with slow applications that bring workloads to a crawl. To have any chance at innovation, more and more companies are moving to a hybrid infrastructure.
    Continue Reading >
  • How Hyperconvergence Increases Business Productivity

    • ePlus Digital Infrastructure Team
    • Feb 13, 2018
    Two-thirds of enterprises report that improving IT efficiency is a top business priority.[1] In addition, 68 percent of IT managers in the same Forrester Research study state that cutting costs is critical. So how does an organization improve IT efficiency and reduce spending?
    Continue Reading >
  • Does Blockchain have a Place in Healthcare?

    • George Pashardis
    • Feb 7, 2018
    Despite the frequent headlines and all the hype that goes with them, blockchain is a difficult concept for many people to understand. Is it a technology or is it a new currency? Is it reality or is it just hype? As with many new things in the technology world, it’s easy to get confused initially, depending on how much information and education is available in the beginning. Two things that I can tell you is that blockchain is becoming disruptive and a lot of industries (Financial, Insurance, Healthcare, Music Industry, Airline Industry and even governments) are adopting or testing it.
    Continue Reading >
  • Taking a Closer Look at CSC 2: Inventory of Authorized and Unauthorized Software

    • Russ Ortmann
    • Feb 1, 2018
    In my last blog post, I discussed the history of the CIS 20 Critical Security Controls and the relevance they hold for organizations today. In my second post on this topic, let’s dive a bit deeper in CSC 2 security control, which is very tightly aligned with CSC 1 (Inventory of Authorized and Unauthorized Devices) control.
    Continue Reading >
  • Three Reasons Why Managed Services are a Cloud’s Best Friend

    • Wayne St. Jacques
    • Jan 19, 2018
    I think we all agree that a successful cloud strategy is important today. In fact, for most organizations, it’s imperative. Global competition and rising costs are driving businesses large and small to explore ways to integrate more cloud services into their operations. In fact, according to Gartner, the public cloud services market will reach $246 billion in 2017, an 18% increase from 2016.
    Continue Reading >
  • The Year of Security Automation: A Look Back

    • ePlus Security Team
    • Jan 18, 2018
    In 2017, the industry saw the birth of security automation. As it continues to grow from infancy into something more robust, now is a good time to reflect on what it is and what operational impacts it is having on our systems.
    Continue Reading >

Tags

Ready To Begin? Contact Us Today.

Request A Presentation