security Articles - Perficient Blogs
Blog

Posts Tagged ‘security’

  • Topics
  • Industries
  • Partners

Explore

Topics

Industries

Partners

Preparing for TLS 1.0/1.1 Deprecation and Why You Should Care

As you may have heard through the grape vine, TLS 1.0/1.1 will be deprecated starting October 31st, 2018. So what does that mean and why should you care? In this article we’ll discuss what this means for users of Lync/Skype for Business on-premises and Skype for Business Online and why TLS 1.2 will be mandatory going […]

Read more

4 Benefits of a Single Sign On in Healthcare

Wouldn’t it be nice if there was a single sign on (SSO) for your daily work routine? How many moments would be spent helping a patient, instead of staring at a screen trying to remember usernames or password credentials? Take a moment and consider this. How many applications, websites, and dashboards do you have to […]

Read more

IoMT and the Necessity for Cybersecurity

Cyber-security: a continuous mission to supervise, support, and evolve data protection. Healthcare providers remain aware and proactive in regards to cyber-attacks or malware that feature threats to patient records, and internal documents. By continuously remaining alert, healthcare organizations can confirm their IoMT networks are secure. What is Internet of Medical Things (IoMT)? IoMT features a […]

Read more

How Microsoft Word “Protected View” Stops Information Leaks

Microsoft Word has long offered support for loading images and templates over the network.  This is a great feature within corporate environments because it facilitates the reuse of assets like logos and corporate document templates.  Unfortunately, these features can be abused by bad actors to obtain operational intelligence on individuals, or even to steal credentials.  […]

Read more

Lightning Flow, Data Security, Summer ’18 Enhancements & More

Top Salesforce Updates You Need to Know Einstein, Lightning & More: What’s New in Salesforce Sales Cloud in Summer ’18 Top 5 Jaw-Dropping Salesforce Communities Summer ’18 Enhancements Why is Data Security Important to Me? Running an Integrated ABM Campaign in 5 Steps Connecting to Salesforce in Outlook Perficient’s Award-Winning Partnership with Salesforce What Organizations […]

Read more

Extreme Customer Experience Makeover

Digital innovation continues to disrupt industries at lightning speed. Today’s organizations are transforming their entire business – from strategy to operations, technology to culture – to better deliver value to their customers. In 2017, we compiled the top 10 trends leaders needed to know when it came to their digital transformation journey. In this 10-week […]

Read more

Salesforce Shield Platform Encryption: Keeping Data Safe

As mentioned in our intro blog, Salesforce Shield: Bringing Compliance to the Cloud, customer information security is critical to Salesforce’s success. In this blog, we’re going to take a look at another part of Salesforce Shield Platform Encryption. When regulations require more protection Your data is already very secure. But to meet the increasingly demanding […]

Read more

Maximo Application Data Import Export – Data Loading

In this first part of my Maximo Data Loading series, I will cover the Maximo Application Data Import Export functionality. This is great functionality that was introduced in version 7.5, and many today still do not utilize it’s functionality. This allows you to go into any Maximo application, and export data from a query or […]

Read more

Overcoming Challenges to Blockchain Adoption

Blockchain was 2017’s technology buzzword of the year, inspired by developments in cryptocurrencies and a desire for more secure transactions. Blockchain technology has the potential to transform enterprise business models through cost reduction and increased operational efficiency. Yet, there are challenges to adopting Blockchain, as it is a nascent technology. Some of these challenges include: […]

Read more

Maximo Public Query Best Practices – or How I Would Do It

It’s happened in more places and implementations than I can count. A client uses Maximo, and a user, we’ll call him Bob, comes up with some great and useful queries. The easiest way to share it? Make it PUBLIC! This is great that Bob can share the query with everyone that uses Maximo. And then […]

Read more

Analyzing the Collision Course of DevOps, AI, and Security

Technology consolidation is constant theme transforming industries. For example, personal computers have merged with tablets and mobile phones as consumers show their interest in computing power on the go. Even applications have gotten smaller, with traditional software replaced by lightweight applications. Logically speaking, the same is happening in the enterprise software world where DevOps, security, […]

Read more

Security in the Cloud with Office 365

Making the move to the cloud can be intimidating. There are many things to consider: What are the best practices? Who are the most knowledgeable vendors? Which is the best solution? But one consideration that should be at the forefront of all cloud migration decisions is security. Many organizations can be hesitant to make the […]

Read more

Identity Management in Office 365

Identity and authentication management is the most crucial component of any migration to Office 365. Office 365 uses the cloud-based user authentication service Azure Active Directory to manage users and offers three identity models: cloud-only, synchronized, and federated. It is important to carefully consider which identity model to use, as well as the cost and […]

Read more

4 Things You Can Do Right Now to Protect Your Azure Resources

Diligence in security implementation for your Microsoft Azure resources is critical. Here are just a few of the ways you can quickly improve your security posture in Azure: Use Security Policies Not only can you define policies for your entire Azure subscription, you can also tailor them for each resource group based on your company’s security […]

Read more

Why Banks And Insurance Companies Need To Continue Investing In Tech

While some companies are keen on trimming the number of legacy IT applications through consolidation, they all agree that investments in technology are critical when it comes to operating in a digital world that has created incredibly high customer expectations. The adoption of mobile devices has significantly changed the operating landscape. During his remarks that […]

Read more

Common Security Risks for ECM Systems

Cybersecurity is a hot topic across all industries, with most companies recognizing the importance of identifying and mitigating risk factors across IT environments. Recent news headlines have focused on external threats, but internal risks represent over $40 billion in losses annually. When developing an enterprise security plan, it’s important to account for common IT security […]

Read more

3 Takeaways from InterConnect 2017’s Opening Keynote

InterConnect officially kicked off this morning with an opening keynote full of powerhouse companies like Twitter, American Airlines, IndieGoGo, and Delos. Throughout the many and varied speakers, a few key themes emerged: 1. The data explosion is an imminent crisis – one that IBM is tackling. Between the Internet of Things and the ever-increasing velocity of […]

Read more

3 Key Takeaways from #HIMSS17

Another HIMSS conference has concluded. It was estimated that more than 45,000 people were at the Orange County Convention Center in Orlando, talking about the latest in health IT, industry trends, and challenges and opportunities. I am always amazed at how social the health IT world is – and it is always great to meet […]

Read more

[Guide] Top 15 Financial Services Trends For 2017

While we can’t always be certain which trends the new year will bring, we can offer predictions based on our conversations with industry executives and our customers, looking at what companies have accomplished in the past year, and the initiatives they already have in place for the future. In fact, that’s exactly how we compiled […]

Read more

3 DevOps Security Tips

Recent distributed denial of service attacks (DDOS) is a salient reminder that the continuous threat of security breaches always looms in the public consciousness. Between legal, technical, and business professionals, such events are enough to motivate leadership to pursue relevant cloud security solutions that drive peace-of-mind and customer confidence. Here at Perficient we talk to […]

Read more

Subscribe to the Weekly Blog Digest:

Sign Up