Wednesday, September 23, 2015

[Interview] protect end-user data against today's threats

Watch the video interview to get expert recommendations on protecting end-user data

Dear Robert,

Let's talk hard facts.
  • 12,000 laptops will be stolen this week
  • 3 out of 4 companies worldwide are failing at disaster readiness
  • Malware strains have increased year-over-year by 77%
  • The average U.S. corporate breach cost $3.5 million in 2014
It's clear endpoint data needs better protection than ever before. Watch the video interview with Gartner Research VP and Distinguished Analyst Dave Russell and Code42 VP of Marketing Ann Fellman to hear how you can secure data in the face of these challenges.

This is a message from Code42.
1 Main St SE, #400, Minneapolis, MN 55414 USA
© 2015 Code 42 Software, Inc. All rights reserved.

Twitter   Facebook   Google+   LinkedIn   YouTube  Code42 Blog: Data on the Edge
CrashPlan, SharePlan, Code42, Data for Life, and the stylized C are trademarks of Code 42 Software, Inc. in the United States. All rights reserved.

The information in this email may be confidential and/or privileged. This email is intended to be reviewed by only the individual or organization named above.

If you are not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any review, dissemination or copying of this email and it's attachments, if any, or the information contained herein is prohibited.  If you have received this email in error, please immediately notify the sender by return email and delete this email from your system.

The Costs of Hiring an In-House IT Team vs. Outsourcing IT Service

Training and certifying new IT employees can be a costly and nerve-wracking experience, but it's a necessary process you have to go through before handing over the reins of your company's unique, sensitive IT ecosystem to unfamiliar newcomers. You want to be able to rest easy, knowing that a team of professionals has your IT operations handled and under control. After all, the last thing you want in the middle of the night is a call that starts with, "Yes, you know our server? Well, it crashed. But don't worry, we'll figure out why, eventually." The costs of not certifying employees are clearly higher that the cost of doing so.

If you do hire new employees, properly certifying them allows you to be confident that they will be familiar with, and able to, solve issues as they arise, and to increase the system's efficiency and effectiveness, perform upgrades and keep usual operations running smoothly. However, things might start to look bleak as you get out your calculator to work out how much this will cost you.

Start with the prices of the individual training and certification programs, but don't stop there. You'll also need to price out the cost of their salaries while they complete the training programs, as well as the price of training equipment, space and utilities, and the cost of the recruitment process of evaluating candidates to objectively judge whether they will be successful IT professionals after training. Of course, there's always the risk of lost investment if your fully trained employee chooses to leave at some point in the future, and repeating the process is required to replace him.

After all of these considerations, you may be looking around, hoping to spot a more reasonable solution. IT outsourcing services can provide you with the perfect situation. You can assign your IT operations to a team of fully trained, responsible professionals, skipping the expensive certification stage and moving straight to a custom solution that is just right for your business's needs. Compared to the expense and risk of building your own in-house team, this can be a much more viable option, especially for small to average-sized companies.

Whether a business chooses to invest the time to train an in-house team, or outsources to a company already equipped to handle their needs, it is vital that competent individuals are in charge of your IT system. Taking the time to properly add up the costs and work involved in training, then objectively compare them to the costs of outsourcing, can save your business money and stress in the long run.

Wednesday, September 16, 2015

News from the cloud


EDR technology, much more than just standard protection
Discover Adaptive Defense 360, the first solution that integrates EPP+EDR.
The new range of Consumer Solutions
All about the multi-device solutions of the new 2016 Consumer range.
PandaLabs Quarterly Report
The cases of ransomware continue growing – attackers are launching new campaigns targeted at thousands of users and businesses.
All about the Ashley Madison scandal
This case taught us many important lessons about cybersecurity.
There are no viruses for Mac, right?
The rootkit "Thunderstrike 2" has arrived and has swiftly refuted this claim.
Virus in the name of WhatsApp
If you receive an email informing you that you have a voice message in WhatsApp, don't open it, it's a malware!
Attention! Ransomwares hidden in CVs
It became a problem for Human Resources Departments, because some CVs can hold their computers at ransom.