IT Insight From NJVC Thought Leaders

Better ideas make better enterprises. NJVC provides insight from some of the most complex technical environments in the world in cloud computing, cyber security, hybrid IT and enterprise management. 
  • Detecting and responding to cyber security threats is an extensive challenge for all IT organizations regardless of their industry.

    Simply put, protecting all the valuable online assets of an organization is difficult even with the multitude of modern controls available. Physical security concepts have built up and matured over literally thousands of years, whereas the digital realm has only existed since dawn of the computer age in the 1940s and 1950s.

    Read More »
  • Online accounts are a hallmark of modern digital life. So why are they so poorly secured? NJVC Cyber Security Principal Robert J. Michalsky explains the challenges in securing online accounts, why current solutions are failing and why the future remains bright for digital ID management.

    Read More »
  • Healthcare professionals should rightly be focused on providing quality healthcare services to patients. Does that mean that the industry should ignore a non-related technical topic, such as cyber security? Hardly, if the data breach history captured by the U.S. Department of Health and Human Services (HHS) is any indication. Data breaches are rampant and increasing in size and frequency.
    Read More »
  • Protecting all forms of digital health information, including personal health information (PHI), wherever it is contained across an enterprise, is one of the fundamental objectives of every healthcare organization. As mandated by the Health Insurance Portability & Accountability Act of 1996 (HIPAA) privacy and security rules, appropriate physical and logical safeguards must be in place to effectively enforce controls on PHI at rest, in transit or in use.
    Read More »
  • As healthcare organizations transition from paper to electronic health records, an enormous opportunity exists to improve healthcare delivery through greater data transparency. For instance, cross-referencing prescriptions can identify potential drug interactions and improve patient outcomes. Such advances, however, bring along an enormous increase in the possibilities for breaches in privacy and security—particularly with unsecured end-user devices, such as smart phones. Health IT leaders must balance the needs of their stakeholders for relevant and timely information with mandated compliance requirements and the total cost of operating and sustaining their systems securely.
     
     
    Read More »
  • Healthcare provider organizations everywhere are evolving patient health data access and management, making personally identifiable information (PII) more digital, mobile and available. With this move comes a quantum increase in the exposure of individually identifiable information within the enterprise and across the extended value chain. The balancing act is to address the need to be agile and responsive to stakeholders, and therefore more competitive, while managing the risk of compromised security with consistently dwindling budgets.  
    Read More »
  • The current state of cyber security has been largely defined by two major factors—an evolving threat landscape, and the various regulations that have been put in place to combat those threats. The amount of sensitive information that is currently available has been increasing exponentially, and will probably continue to do so.
    Read More »
  • The benefits that a Virtual Desktop Infrastructure offers an organization cannot be realized by simply building virtual machines. As with managing traditional desktops the overall sophistication of management of the VDI environmentdetermines the savings. NJVC has constructed a holistic VDI offer: the Managed Desktop Infrastructure (MDI)—a combination of VDI and the management of the VDI environment that enables a streamlined process for migrating and maintaining the operating system, applications and the user persona between devices in this environment.
    Read More »
  • The entire Internet protocol version four address space provides approximately 4.3 billion unique IP addresses. With a current world population of more than 7 billion, that is not enough for even one IP address per person. Since individuals today use multiple methods, such as mobile phones, iPads and laptops, to access Internet content, the number of unique IP addresses required per person has increased significantly. Even more compelling, however, is the proliferation of IP addresses for ubiquitous use in mobile devices, household appliances, automobiles and sensors.
    Read More »
  • In response to recent trends in federal information management to move towards cloud computing the Intelligence and National Security Alliance convened a working group to study the mission impacts of cloud computing on the Intelligence Community (IC). The Cloud Computing Task Force collected and analyzed data through a concerted effort in which two groups conducted over 50 interviews with thought leaders and policy makers in the public and private sectors.
    Read More »

Pages