Welcome!

Michelle Drolet

Subscribe to Michelle Drolet: eMailAlertsEmail Alerts
Get Michelle Drolet via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Michelle Drolet

A virtual Chief Information Security Officer (CISO) can be an invaluable asset to your company. The virtual CISO provides your business with a person who will be in charge of the electronic security aspects of your company. You will have an executive in place that will not only oversee your electronic security, but will also define it. Because the CISO is virtual, which means they work off-site, they cost only a small fraction of what a full-time, on-site person would cost. You get all the benefits of having an executive director of security without having to pay the additional money to keep on at your office and pay all the liability insurance and benefits that are associated with making a hire of that nature. With a virtual CISO, you have someone who can perform jobs that are mandated by government compliance regulations. Anyone who works with the cyber security a... (more)

Patch as Patch Can: All Software Is Flawed

Many IT departments have weak patching processes - especially on the client-side. And it's no wonder - patching is tough. Across all industries and platforms, the Window of Exploit (WOE) - that is, the time lag between announced discovery and the availability of a patch - for web-based vulnerabilities is a whopping 233 days, according to WhiteHat Security. This leaves your organization exposed for an unacceptably long period of time. It may not be glamorous, but a meticulous patching program is necessary to prevent server and client-side exploits. HP's DVLabs and other research ba... (more)

BYOD Can Spell Trouble

Whether you choose to embrace it or you try to resist it, the BYOD (Bring Your Own Device) trend is set to grow. The Cisco IBSG Horizons Study found that 78% of white-collar workers in the U.S. use a mobile device for work purposes and 41% of respondents indicated a majority of smartphones connecting to their company network are actually employee-owned. If you don't already have a BYOD policy then you need one right now. The trouble is that employees will connect to your network and use their personal mobile devices for work whether you allow it or not. In the past your company n... (more)

The Benefits of Cloud-Based Endpoint Security

The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared to $46 billion just six years ago. Mirroring the general trend for SaaS solutions, cloud-based IT security systems can be an ideal fit for smaller businesses, freeing them from internal IT overhead, cutting complexity, and providing scalability. Here are five reasons that switching to a cloud-based endpoint security system makes sense for your business: 1. Best practices are built-i... (more)

Test All Apps to Keep Hackers from Penetrating Castle Walls

Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they have been hacked at least once in the last two years. While most large businesses have begun application vulnerability testing, there is still a long way to go. After all, you are only as strong as your weakest link; hackers will undoubtedly find and attack any application without... (more)