Videos

Liberty Takes on Midsize Enterprise in San Diego

Liberty Technology has always made it a priority to participate in events, from educational lunch and learns to customer appreciation VIP day at Porsche Driving Experience. As an active member of The Channel Company community, this year we attended the Midsize Enterprise Summit in San Diego as a vendor. This group of mid-size technology directors face unique challenges and technology pain points. They’re very often facing heavy demands with small teams and budgets.

This year’s event featured a workshop the day after the summit specifically targeted to security needs. As a vendor, Liberty had one-on-one conversations and gave Cisco Stealthwatch demos during the Solutions Pavilion, as well as presenting at the security workshop. In spending time with attendees, it was clear that most midsize organizations don’t have CISOs, so the burden of security needs falls on the CIOs. They need appropriately scaled solutions to help them manage increasing security threats. Here’s a summary of the insights that we shared with these business leaders. But first, watch our recap video:

Organizations are spending tons of money on security, yet breaches are still inevitable.

Recent reports put security spending at $96 billion this year, but 66 percent of companies are reporting breaches – multiple ones. And the cost of a breach in buyer confidence and in dollars (estimated at $500,000 to $20 million) would mean closing the doors for many midmarket enterprises. It’s become a game of “whack a mole” – a new threat type is discovered and a new point solution to address that threat type immediately goes to market. Unfortunately, all these solutions increase complexity more than they increase security. The more solutions you add, the more difficult it is to correlate all that information and see what needs to be addressed.

You can’t fight what you can’t see. Visibility is the cornerstone of your defense.

It’s not enough to compile the data; we need to gain real insight into attackers’ behaviors. The industry average for detecting a network threat is 197 days. That means if a coworker clicks on the wrong link or attachment today, on average the threat wouldn’t be detected until around mid-April of 2019.

And, perhaps more surprisingly, even after threats are detected, an average of 54 percent of them go unremediated. Most often that’s because the various security solutions don’t work together. An effective security solution needs to communicate and share data from cloud, network, and endpoints – compiling the intel in one place so you can actually identify the real threat instead of spending valuable time sifting through all the noise. Then, once that threat is identified…

The way you respond to a security event determines its impact.

How you react is critical. Research reveals that it takes an actual incident to motivate many organizations to patch critical vulnerabilities – even foreknowledge of an active exploit isn’t enough. It isn’t because people are indifferent or lazy; it’s simply because digital transformation is happening at a pace beyond all anticipation, which is greatly increasing demand on IT staff.

Conversely, to be effective, security is inherently complex. Successfully thwarting cyberattacks requires sophisticated detection, with real-time response, prioritization, and threat intelligence to help you stay ahead of attacks. What’s more, it’s absolutely crucial to train users about new and advancing attack strategies. Good news is, we can help.

Liberty Technology has a hybrid solution to immediately increase your effectiveness.

We can say this with confidence because we’ve built our own security systems through layering components of Cisco’s Security Architecture scaled to specific needs. Our defense layer of protection is powered by Talos, one of the largest threat intelligence teams in the world – blocking over 20 billion threats each day with an average detection time of 4.6 hours.

We are currently setting appointments to help identify and remedy security gaps in your current solutions – at no cost or obligation to you. Give us a call at 770-800-0537, and begin to experience what we mean by Freedom Through Technology.

Back Next

Recent Blogs

Why It Security Is Important For Business

While Liberty Technology provides IT disaster recovery and stands ready to assist you in a moment of crisis, we hope that day never comes. Taking preventative measures can drastically increase the probability that it never will. Don’t think you need the top of the line in IT security or worried it costs too much money? […]
Oct 9th, 2018 | by Ben Johnson

How To Manage A Hybrid Workplace

Working remotely was not just a temporary effect of the COVID-19 pandemic. In fact, it’s not going anywhere. Many businesses are making permanent shifts to full-time remote or hybrid models. If your business has taken this route, have you considered how that will affect data security? Your current security measures and policies are based on […]
Oct 9th, 2018 | by Charles Goodsell

Why Your Company Needs An IT Assessment

How do you feel about your company’s data security? If a hacker tried to steal your data, would they succeed? Would such an occurrence catch you completely off guard and throw your organization into disarray? Would you look back and wonder what you could have done differently to prevent it? The truth is, there is […]
Oct 9th, 2018 | by Charles Goodsell

Having trouble staffing your Internal IT?

In the post-pandemic economy, many small business owners are having trouble getting back to “business as usual.” A big part of that challenge has been attracting talent. According to National Federation of Independent Businesses (NFIB) Chief Economist Bill Dunkelberg, “Main Street is doing better as state and local restrictions are eased, but finding qualified labour […]
Oct 9th, 2018 | by Ben Johnson

5 Things to Look for When Choosing an MSP

A managed service provider (MSP) can provide significant value to your organization. An increasing number of businesses and organizations are turning to MSPs to address their IT needs, including: Security: The constant battle against cyber attacks, data protection and retention, disaster recovery and more involves constant oversight and research that most IT departments simply don’t […]
Oct 9th, 2018 | by Charles Goodsell

The Evolution of the Cloud

Market trends are changing, and the IT world is on the cusp of a big shift. We at Liberty have a mission to stay on the leading edge of all things IT, and it’s our job to make sure you stay right out front alongside us. With the newest consumption model taking form, we are […]
Oct 9th, 2018 | by Ben Johnson

Windows 7 End of Life

After 10 years as one of the most universally loved operating systems, Windows 7 End of Life (EoL) is taking place January 14, 2020. And if there’s one thing zombie season should teach us, it’s to know when it’s time to say goodbye. Sure, Windows 7 brought new features, advancements, increased functionality and usability to […]
Oct 9th, 2018 | by Charles Goodsell

Ryuk Ransomware Attacks and What You Need to Know

Law Enforcement and other Governmental Agencies all over Georgia recently received a shocking warning in regards to what is being characterized as a targeted and organized series of Malware attacks. Shortly after this warning was released, over 20 Texas agencies were crippled. Ryuk Ransomware attacks are targeting Law Enforcement and Government Agencies in an attempt […]
Oct 9th, 2018 | by Ben Johnson

Dishing on Vishing and Phishing

Fraudsters are lurking everywhere, sometimes even in plain sight if you know what to look for. Some hacker-favorite tactics include vishing and phishing. Not sure what these odd words mean? Here’s a quick IT vocab lesson. vish-ing (noun) the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies […]
Oct 9th, 2018 | by Charles Goodsell

Two Ways to Protect Your Invisible Assets

At Liberty, we stand by our statement: The best way to get hacked is to believe you won’t be. It makes sense to protect the assets you can see, but, with an average cost of $3.86 million, a data breach of your “invisible” network resources could be even more costly than you might imagine. From […]
Oct 9th, 2018 | by Ben Johnson

Customer Success Story: Vanguard Truck Centers

Vanguard Truck Centers is a company of 500-1000 employees, based in Atlanta, Ga. They own and operate full-service commercial truck centers. Vanguard needed to connect 15 environments in six locations across four states with a unified collaboration solution that brought together audio, video, and content sharing to make meetings easier and more effective. Liberty Technology’s […]
Oct 9th, 2018 | by Charles Goodsell

When It Comes to Selecting a Workstation, We Think There's Only One Option You Should Consider: Lenovo.

As the new year gets underway, it’s time to reassess our relationships — including the one with our technology. Are you still getting what you need from your computer, or have your needs (or the demands of work) changed? If your PC has slowed down, or you have a laptop that doesn’t last long enough […]
Oct 9th, 2018 | by Ben Johnson