How much does remote access cost? 5 factors to consider

| | All Blog Posts
Determining how much remote access will cost an enterprise is not a simple cut and dry calculation. The reason: different remote access companies may provide a variety of options or deployment models which provide different levels of value to their client companies. Some may provide only bare-bones access, without any ... Read More

The 3 best VPN alternatives for enterprises

| | All Blog Posts
Virtual private networks (VPNs), a staple of enterprise networks, offers a method of secure remote connection between users and the private corporate network. The problem is that VPN technology hasn’t really evolved with the changing nature of enterprise business. The perimeter has expanded and fractured with work from home arrangements ... Read More

7 common VPN problems: The not-so-good, the bad, and the ugly

| | All Blog Posts
A Virtual Private Network (VPN) is perfect for internal employees who need to access the server (or section of the server) from anywhere besides the office. In fact, at SecureLink we use them on our laptops to do just that; if you need to work remotely and need to update ... Read More
Two-step Password Verification

How to avoid a vendor breach in 5 simple steps

| | All Blog Posts
If a burglar has the key to your house, having a state-of-the-art lock won’t keep them out. That’s exactly what happens when you allow vendors onto your network with privileged credentials without a solution that provides proper identity, access, and audit controls. When you need to grant privileged access, a ... Read More

How to design and implement a vendor management process

| | All Blog Posts
Whether you’re a small business or a global enterprise, over the last decade or so outsourcing business functions to third-party vendors has become essential to your business operations. Vendors are used in nearly every business process. They provide tech support, back-office and e-commerce platforms, networked and cloud-based applications and networks ... Read More
Vendor Management process

How to Design a Vendor Management Process

Whether you’re a small business or a global enterprise, over the last decade or so outsourcing business functions to third-party vendors has become essential to your business operations. Vendors are used in nearly every business process. They provide tech support, back-office and e-commerce platforms, networked and cloud-based applications and networks ... Read More
Security Boulevard

Six essentials of company data security

| | All Blog Posts
Data breaches are not just a problem, they are a crisis The list of companies that have had their data security breached seems endless: Target, Facebook, T-Mobile, Marriott, Quest Laboratories, Quora, Equifax and on and on and on. It’s no wonder that a recent study by Cisco showed that 31% ... Read More

13 things to know about CJIS compliance

| | All Blog Posts
Law Enforcement Agencies (LEOs) and other government entities and the companies that access or manage sensitive US Justice Department information need to ensure that their processes and systems comply with the FBI’s Criminal Justice Information Services (CJIS) policies for wireless networking, data encryption, and remote access. CJIS compliance is important ... Read More

The essentials of vendor risk management

| | All Blog Posts
You can’t have trusted partners without a risk management program Today, it’s common for companies to outsource their noncore functions to vendors. It makes good business sense to focus company resources on your business and let other companies handle the standard IT infrastructure but only if the associated risks are ... Read More

Are your vendors compromising your compliance?

| | All Blog Posts
When the European Union’s comprehensive privacy legislation, the General Data Protection Regulation (GDPR), went into effect last year, it put privacy compliance on the road map for many companies, including those where it wasn’t traditionally a priority. Even companies where GDPR doesn’t apply are having to contend with existing or ... Read More