Home / Bradford Networks Blog
Monday, May 7th, 2018
Most organizations these days are focused on efficiency. This makes perfect sense, since efficiency generally yields profitability. In today’s business environment, many employees are tech savvy enough to be dangerous, and the desire to quickly implement technologies that drive efficiency has resulted in increasing amounts of Shadow IT.
Thursday, April 19th, 2018
You can’t go anywhere these days without coming across one of these two terms. IoT and GDPR are hot and it turns out there’s an interesting link between them.
Wednesday, February 28th, 2018
Whether manufacturing organizations are retrofitting IoT devices into existing manufacturing equipment or buying new equipment that already includes IoT devices and sensors, it is clear that IoT devices are poised to dramatically improve manufacturing efficiency.
Sunday, November 19th, 2017
The National Institute of Standards and Technology (NIST) has a number of guidelines and best practices for cybersecurity concerns across industries; one of their most well-known guides is their Cybersecurity Framework, originally created in February 2014, with a major revision underway as of January 2017.
Monday, November 6th, 2017
It’s no secret that IoT, BYOD and mobile access have made endpoints one of the most concerning network security gaps. 2017 marks the beginning of a surge in the number of organizations that are incorporating IoT devices into operations technology such as, lights, HVAC, cameras and security sensors, as well as designing highly automated Smart Buildings.
Monday, October 23rd, 2017
On May 25, 2018 the European Union will begin enforcing the new General Data Protection Regulations (GDPR) that will create one data protection standard throughout the EU.
Wednesday, August 2nd, 2017
Don’t you wish companies would tell you how to fix the problems covered in today’s headlines? Our healthcare security challenges infographic explores how you can put technology to work to uncover threats faster, decrease events stemming from human error, and simplify access management.
Thursday, July 20th, 2017
Comprehensive network visibility is part of the foundation of a strong security posture. Yet, a number of organizations with otherwise great security have not considered the need for comprehensive visibility.
Wednesday, July 12th, 2017
Healthcare organizations face significant challenges, including rising breaches, elevated risk from IoT devices, increased HIPAA oversight, and looming GDPR requirements. This brief provides a summary of current market conditions and a checklist that details how to implement an end-to-end network visibility and control solution.
Thursday, May 4th, 2017
As enterprise organizations continue to add BYOD, IoT devices, virtual servers/cloud services, switches, routers and offices that are connected and sharing information throughout the globe, the task of identifying and securing these endpoints can seem overwhelming.
Tuesday, March 28th, 2017
As we reach the end of Q1, we like to take some time to reflect on the changes and trends in network access control and endpoint security in this first quarter of the year.
Tuesday, February 14th, 2017
With RSA Conference 2017 kicking off this week, the security eco-system convenes to showcase and discuss the latest advances in the cybersecurity battle.
Monday, February 6th, 2017
We’re looking forward to participating at RSA Conference 2017 in San Francisco. The event will bring together leading cyber-security experts to discuss trends and strategies that can help you stay ahead of cyber threats.
Friday, January 27th, 2017
As you plan for 2017, get the facts on endpoint security and stay current on the trends. This Infographic compiles relevant data from Gartner, IDC, The Ponemon Institute, Symantec and others, on the current state of network security threats from mobile, IoT and other endpoints.
Monday, December 12th, 2016
The holiday season is the busiest time of the year for many organizations, and credit card or contactless payment transactions abound.
Thursday, November 10th, 2016
As more healthcare information is stored and transmitted digitally, ensuring that your organization complies with the myriad of federal and state regulations is becoming increasingly difficult.
Wednesday, October 26th, 2016
On October 21st, waves of crippling Distributed Denial-of-Service (DDoS) attacks left some of the most prominent names on the web struggling to ensure consistent access.
Monday, October 24th, 2016
For most IT teams, addressing or thinking about cyber security is a daily concern. From updating AV software to creating security profiles, most IT professionals spend a portion of their day on tasks with a goal of securing their network.
Monday, October 3rd, 2016
Enterprise organizations are appealing targets for hackers. These networks can provide everything from valuable personal data profiles, to financial and research data – all valuable commodities on the dark web.
*We value your privacy and use a variety of security measures to protect your personal information.
Our email is permission-based and we will only send you relevant information.