Home > RSS Feeds > Expert Voices
  • Serving on a customer advisory board brings significant insight and value—but it’s important to choose one that is a good fit.

  • Digital platforms are the key to innovative business models and quality customer interaction.

  • The CTO of Deloitte Consulting shares some advice for CIOs undertaking a digital transition: It will challenge IT to grow beyond business as usual.

  • Cyber-criminals have an uncanny ability to stay under the radar for long periods of time—making the difficult business of cyber-protection even more difficult. Cyber-security is an ever-evolving undertaking, and the need for enterprises to reassess their security tools is constant. In recent case studies on cyber-security conducted by network security monitoring firm Damballa, a light is cast on the nefarious lives of cyber-thieves. The study, "Q1 2016 State of Infections Report," reveals just how easy it is to purchase or rent havoc-causing malware. "It's no small feat to keep up with how cyber-criminals operate. Attackers have an incredibly vibrant underground community where they can buy or rent anything from command-and-control infrastructure to sophisticated exploit kits to bare metal malware," said Steven Newman, CTO of Damballa. "While this report highlights several themes that our Threat Discovery Center has followed over the past several months, one common factor is that you never know what to expect from threat actors." The findings result from an eight-month study of Pony Loader malware, and the measures cyber-criminals took to evade detection. Leave-no-trace-malware, like Destover, can be wiped, which helps attackers stay under the radar for months. The report also found that the path of least resistance makes "dumb" malware, like MegalodonHTTP, appealing to criminals. Highlights of the findings regarding Pony Loader are below. 

  • By partnering with the business to improve print services, CIOs can significantly reduce enterprisewide costs per printed document.

  • Strong IT leadership requires developing a strong business sense while acting as expert stand-ins for stakeholders’ tech-related decisions.

  • When companies leverage IoT and engineering analytics, they can create immense value by eliminating waste, conserving energy and optimizing the supply chain.

  • During the last two years, Target, Home Depot, Sony and J.P. Morgan have been the victims of major data breaches. The J.P. Morgan case in 2015 is notable because the information compromised did not relate merely to personal information typically used for identity theft, like customers' Social Security numbers or credit card information. Rather, hackers used the email addresses they collected to solicit J.P. Morgan customers to purchase penny stocks. These high-profile crimes are reminders for all organizations to re-evaluate their cyber security protocols and carefully monitor and evaluate their cyber-risk strategies. Christopher Roach, managing director and national IT leader of CBIZ Risk and Advisory Services, said "Periodic cyber-risk assessments should be part of your monitoring activities so that you can see how your systems are holding up to internal and external risks in your operating environment." One recommendation: "Plan changes, such as adding a new third-party service provider or moving office locations are also good times to revisit and update your cyber-risk strategy." Here are 10 key lessons to learn from J.P. Morgan's missteps.