Ten Things You Might Not Know About IBM MaaS360

With unique, unified mobility management capabilities, available across a wide variety of mobile, PC and Mac devices, there is more to IBM MaaS360 than is evident at first sight. Read the blogpost, Ten things you might not know about IBM MaaS360,” or watch the video above to learn about the distinctive EMM solution capabilities that IBM MaaS360 has to offer.

Need more reasons? For the fifth consecutive year, IBM MaaS360 has been recognized as a leader in Gartner’s Magic Quadrant for Enterprise Mobility Management Suites report.

Contact us today if you have questions about IBM Products and Services. A representative from DCM Data Systems (IT Division of DCM Ltd.) will respond as soon as possible with answers to your questions.


How to protect your computer against the ransomware attack

Microsoft reneges on update policy to push out patch for unsupported Windows XP and Windows 8 to help defend against ransomware attack.

A laptop infected by ‘WannaCry’ ransomware.

Friday’s ransomware outbreak, which used recently revealed weaknesses in Microsoft’s Windows operating system to spread further and faster than any before, has prompted the Redmond-based developer to break its own rules on software maintenance in an effort to keep users safe.

The ransomware, also known as “WanaCrypt0r”, “WeCry”, “WanaCrypt” or “WeCrypt0r”, used a vulnerability in a Windows Server component to spread within corporate networks. The weakness was first revealed to the world as part of a massive dump of software vulnerabilities discovered by the NSA and then stolen by a group of hackers calling themselves “Shadow Brokers”.

Microsoft fixed the flaw shortly before the stolen data was published, leading many to conclude it had been surreptitiously tipped-off by the security agency about the existence of the flaw. Read more..

Cybersecurity stocks boom after ransomware attack

The ransomware attack that disrupted the NHS and businesses around the world has led to a boom in share prices of cybersecurity companies – including the firm used by the health service to protect it against hackers.

An electronic board shows the stock indicator of a securities firm in Tokyo.

With governments and companies expected to increase spending on IT security after being caught out by the attack, cybersecurity firms have seen their stock market values climb sharply over the past two days.

Shares in Sophos, a cloud network security specialist which counts the NHS among its clients, have jumped by about 8%. Over the weekend, a claim on the company’s website that “the NHS is totally protected with Sophos” was changed to “Sophos understands the security needs of the NHS”. Last week, the company tweeted its “top five tips for securing NHS organisations”. But its shares have been performing well over recent months because of the increased need for cyber defences.

Meanwhile, NCC group added 5% to its share valuation and cyber consultancy group ECSC surged 42%. ISE, a fund invested in cybersecurity businesses, added nearly 4%.

Read more @ Stock boon ransomware attack.

IBM Automates Compliance Controls and Data Security for Multi-Cloud Workloads

IBM InterConnect – IBM (NYSE: IBM) today announced a new cloud-based solution that provides workload security for data and applications and automates reporting to assist with regulatory requirements. The solution, IBM Cloud Secure Virtualization, is optimized for technology from Intel and HyTrust to simplify reporting demands for organizations in highly regulated industries and provide hardware-enhanced workload security.

IBM deploys an immune system-like approach to security – with data analytics and Watson for CyberSecurity helping clients to discover, manage and remediate threats across the entire enterprise. IBM is providing a security-rich cloud computing environment for customers by incorporating its own security technologies with capabilities from partners Intel and HyTrust.

Data security is a primary concern for enterprises considering hybrid cloud adoption – particularly in highly regulated industries such as financial services, healthcare and government. According to Technology Business Research, more than 40 percent of enterprises surveyed cite security as the most important factor in the hybrid cloud decision process1.

Read more @ https://goo.gl/iFtLMo.

Contact us for any consultation needed about IBM Products and Services. A representative from DCM Data Systems (IT Division of DCM Ltd.) will respond as soon as possible with answers to your questions.

IT Security Workers Expect IoT Cybersecurity Attack Increase

As more industries, including healthcare, continue to implement connected devices in critical infrastructure segments, there will likely be an increase in Industrial Internet of Things (IIoT) cybersecurity attacks, according to a recent Tripwire survey.

The majority of surveyed IT security professionals – 96 percent – reported that they expect to see an increase in IIoT security attacks in 2017. However, 51 percent admitted that they “do not feel prepared for security attacks that abuse, exploit, or maliciously leverage insecure IIoT devices.”

“Industry professionals know that the Industrial Internet of Things security is a problem today. More than half of the respondents said they don’t feel prepared to detect and stop cyber attacks against IIoT,” Tripwire Chief Technology Officer David Meltzer said in a statement. “There are only two ways this scenario plays out: Either we change our level of preparation or we experience the realization of these risks. The reality is that cyber attacks in the industrial space can have significant consequences in terms of safety and the availability of critical operations.”

The survey was commissioned by Dimensional Research, and included the responses from approximately 400 individuals who “had responsibility for IT security as a significant part of their job.”

Focus on Enterprise Cybersecurity Shifts Industry

Recent events indicate that consumers, government bodies and enterprises are all now vulnerable to cyberattack. As increased usage of mobile devices and applications, cloud computing, the Internet of Things (IoT) and an overall more complex hybrid IT environment open up new possibilities for cybercrime, enterprises of all sizes are not only putting their confidential information at risk but also their revenues, customers and reputations.  Read more..http://siliconwar.com/?p=3852

Do you provide tablets to your sales team?

Image result for Enterprise mobility Management systemMobile is the new playground for thieves. Now a day’s mobility is transforming organizations at an unprecedented rate. Hackers and thieves are seizing on this opportunity to penetrate network and acquire organizations sensitive work data from mobile endpoints. The BYOD trend in the workplace is spreading, helping organizations mobilize their workforce.

But do you know

An estimated 16 million mobile devices are infected by malware at any given time. Mobile Malware is malicious software specifically built to attack mobile devices, relying on exploits of particular operating systems.

Put an end to all these threats through our comprehensive– Mobile Threat Management system.

To know more you can reach us at …….DCM Data Systems.

No business can tolerate downtime: Does your team have what it takes?


No business can tolerate downtime: Does your team have what it takes? Organizations guided by a sound business continuity strategy have a definite competitive advantage over others.

Even the best laid plans frequently go awry due to business disruptions. And disruptions that hinder business and IT operations are an everyday occurrence in every industry. In the absence of robust business continuity management (BCM) and communications, these disruptions can expose your organization to considerable risk. While many organizations do indeed deploy BCM plans, they can often be ineffective and too rudimentary to keep disasters at bay.

In the infographic “ Disaster recovery’s treacherous terrain ,” IBM sheds light on the obstacles that your business resiliency professionals face while fulfilling high availability expectations.

View the infographic and assess how equipped your business continuity team is to navigate today’s challenging environment.

Contact us today if you have questions about IBM Products and Services at DCM Data Systems IBM Alliance . A representative from DCM Data Systems (IT Division of DCM Ltd.) will respond as soon as possible with answers to your questions.

Source: IBM Zift Platform.

Industry Outlook: Is Your Data Center Secure?

This week, Industry Outlook asks Sri Sundaralingam, head of product marketing (enterprise security products) at Symantec, about how data center operators can respond to the changing threats they face today.

Industry Outlook: What are some of the newer security threats data centers face and how do they work?

Sri Sundaralingam: Enterprise IT infrastructures are increasingly varied and complex. As a result, security threats have evolved, and there are a variety of new ways that malicious actors can try and gain access to a data center. New threats appear every day, but the following are some that my team has seen recently:

  • Sophisticated malware tool kits to enable custom spying: Malware is any software (spyware, ransomware, viruses, etc.) that is installed on your computer without your consent. Malware isn’t anything new, but what I’ve seen in recent years is new advanced malware that has been used in systematic spying campaigns. For example, Reign, a malware discovered by Symantec, gives its controllers a powerful framework for mass surveillance. Reign is installed through a web browser or by exploiting an application, and it provides customizable access to users and/or a data center. In executing spyware of this type, malicious actors can gather confidential data such as passwords, steal Social Security and credit-card numbers, monitor keyword strokes, track browsing habits and harvest email addresses. Read more…