<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

Solutions II Blog

Your Data is Your Most Valuable Asset

Posted by Mike Hicken on Oct 18, 2017 11:00:00 AM

There is no doubt that body cameras and live streaming video has helped with officer and civilian safety. Body cams are starting to play a significant role in how we investigate crime and this method is growing at a rapid pace. In today’s world, having a video camera in your pocket at all times is the norm so even civilian videos need to be stored for evidence. Both small and large agencies around the country need to be prepared for large costs of implementing cameras on officers. Cameras alone are expensive, although, the real costs occur within the IT infrastructure needed to store, protect and backup these large files once produced.

Read More

Topics: Business Continuity, Data Protection, Security, Public Safety

Security 101...Protect Your Digital Assets Because the Bad Guys are Winning!

Posted by Todd Bowling on Sep 21, 2017 11:30:00 AM

I am often asked (being in the business if IT security and cybercrime intel & defense) what can I do to prevent from being "hacked or breached"? I bet I get this question at least every other day and try to answer it to the best of my ability knowing that none of the questions or my answers are the same; similar? Yes, but identical? No. I also don't claim to be the "EXPERT" because I have met some of the best and brightest in this industry that fight this type of scourge on our behalf every day, from the cybercrime professionals at the FBI to those fighting cyber terrorism across numerous government and private agencies. To my astonishment I am also regularly amazed at the sheer lack of knowledge most people have when it comes to talking/understanding this topic given we have been hearing about it for years now. I do however, find a genuine "thirst" for learning about cybercrime and all of its offshoots. Unfortunately, this topic is complex and always on the morph. It is not easily "5-minute rice" or "Cliff Notes" addressable. So, let me start by discussing the most common, and likely most relevant, areas to begin a learning curve.

Read More

Topics: Business Continuity, Data Protection, Security, Security Breach, Cybercrime

Malware Security Injection

Posted by Matt Gourley on May 3, 2017 11:00:00 AM

Recently I attended a meeting in Denver where I learned from a top Government agency on Cyber and Homeland Security, that the number one attack continues to be phishing. We live in a digital world with trigger happy users who are targets of malicious hackers, this results in increased vulnerability and threat to business security. While phishing is one major attack, malware injections also are high on the list, but just how do you protect against these issues?

Read More

Topics: Data Protection, Security