Wednesday, August 31, 2022

Customer Story: Butler University

"Customer Story: Butler University" is a wonderfully engaging and quick-hitting video that shows how the university's IT department stays ahead of bandwidth requirements that double every 3 years. Contact us today for more information on how to rapidly identify root causes of Wi-Fi issues or be alerted to anomalies in usage before they become serious problems.

Tuesday, August 30, 2022

More ways to collaborate seamlessly outside your organization with Microsoft Teams

Being able to effectively collaborate with external partners is now essential to driving positive business outcomes. Read the blog to gain insight on how Microsoft 365 provides multiple options when collaborating with external organizations in Microsoft Teams.

Read More...

Monday, August 29, 2022

Protecting Against Cyber Threats from Nation States

When looking at cyber threats posed by nation states, organizations need to assess their risk and prioritize security accordingly. What are the goals of states and criminal gangs? What risks do they pose? Read this article for an overview and tips on protective measures.

Read More...

Wireless Health: Powerful Heuristics for Smarter Troubleshooting

This academic white paper entitled "Wireless Health: Powerful Heuristics for Smarter Troubleshooting" explores how Cisco Meraki's Wireless Health feature simplifies root cause analysis for all connected wireless clients in a single dashboard, enabling IT teams to answer complex questions without having to manually dig through the entire network stack. Contact us today for more information on how to rapidly identify root causes of Wi-Fi issues or be alerted to anomalies in usage before they become serious problems.

View: Wireless Health: Powerful Heuristics for Smarter Troubleshooting

Friday, August 26, 2022

Supporting Your New and Future Remote Workforce

This flyer explains how the business world is gravitating increasingly toward remote work and gives some quick tips on how organizations can leverage technology to make WFH work for them. For more information, please contact us today. 

View: Supporting Your New and Future Remote Workforce

Thursday, August 25, 2022

As Microsoft is showing, workers may never come back to the office

We have reached a point in the originally pandemic-fueled work-from-home scenario where many workers today turn down jobs that require them to spend all working hours in the office. Read the blog to see how Microsoft and other companies are responding to employees' demands for remote work time.

Read More...

New York is First State to Require CLE Course in Cybersecurity

Lawyers in New York have a new CLE requirement that includes one hour of coursework in cybersecurity, data privacy or data protection. Read the article for additional insight on where these requirements fit into ethical competence standards.

Read More...

Wednesday, August 24, 2022

How to build an organizational culture that is cybersecurity ready

Digital transformation has helped fuel the intensification of cyber threats, making cybersecurity failure a critical short-term risk. A strong cybersecurity culture goes a long way to minimize cybersecurity risks. Read this article for insight on how to build a cybersecurity-ready culture.

Read More...

What To Know About Cloud-Based Security Amid Digital Transformation

As organizations continue to become more efficient due to the adoption of cloud technology, security concerns have increased as data now spreads across countless applications—both on-premises and in the cloud. Read the blog to gain insight on cloud-based security amid digital transformation.

Read More...

Friday, August 19, 2022

Introducing Surface Book 3

Ready for the "wow" factor? The most powerful Microsoft® Surface® laptop yet is faster than ever and able to adapt to the endless ways in which you and your team collaborate. The "Introducing Surface Book 3" video artfully demonstrates its powerhouse performance and stunning display. Rendered on a Surface Book 3, the video itself beautifully illustrates the device's robust capabilities and seamless versatility in action. Contact us today for more information.

Thursday, August 18, 2022

We're Spending Billions Each Year on Cybersecurity. So Why Aren't Breaches Going Away?

A recent FBI Internet Crime Report shows it received over 847,376 cybersecurity complaints in a year, representing almost $7 million in business losses. This, despite the billions of dollars businesses and governments spend fighting these attacks. Why, with the big brains and big budgets being thrown at cybercrime, are businesses continuing to fall prey to breaches? Read this article from CPO for answers.

Read More...

Wednesday, August 17, 2022

Twilio Employees Duped by Text Message Phishing Attack

Multiple employees of Twilio, the customer engagement platform provider, were duped into providing their credentials to threat actors in a phishing campaign the company described as a "sophisticated social engineering attack." Read the blog to learn how the threat actors beat Twilio at its own game and steps taken by the victim to contain the damage.

Read More...

Tuesday, August 16, 2022

Rising Cyberthreats Increase Cyber Insurance Premiums While Reducing Availability

Cyber insurance has been around for decades. And while more companies are looking for insurance against attacks, insurers are taking steps to limit their exposure to losses, impacting pricing and coverage. Read this WatchBlog post from the GAO on how rising cyberthreats are impacting the insurance market.

Read More...

Look to Cloud for Better Risk Management

A new survey-based study on measuring risk and risk governance indicates the public cloud is the way to go for enterprises wanting to reduce their risk exposure. Read this blog detailing a two-phased project that involved 20 executive interviews and a survey that garnered more than 600 responses.

Read More...

Friday, August 5, 2022

3 Key Resources to Accelerate Your Passwordless Journey

Password challenges abound for every organization as even the strongest passwords are easily phish-able and vulnerable to attacks such as password spray and credential stuffing. Read the blog to gain insight on the technology that exists to make sign-ins simpler and more secure.

Read More...

Thursday, August 4, 2022

Security Made Simple with Cisco Meraki

"Security Made Simple with Cisco Meraki" is a quick video about its powerful enterprise-grade security that features simplicity, ensuring that your clients are covered 24/7 across every layer of their network. The Meraki suite of security solutions automatically detects, stops, and quarantines threats while your clients manage everything through the cloud-managed, best-in-class dashboard.

Wednesday, August 3, 2022

SMB Network Security Basics

This easy-to-digest checklist about SMB Network Security Basics describes network security, how it works, and the benefits. It details 13 types of network security, plus 6 steps your audience can take to secure their network. Help your customers protect their data's usability and integrity with network security from Cisco Designed for SMB.

View: SMB Network Security Basics

Tuesday, August 2, 2022

Tech hardware spending may be headed on the decline

Organizations today are taking a hard look at where they can trim their capital expenses and delay large tech purchases that might not be absolutely necessary. Read the blog to learn why spending on hardware is expected to grow at the slowest rate among major IT spending categories.

Read More...

Monday, August 1, 2022

Best Cybersecurity Certifications in 2022

While it may be true that businesses can improve their security posture by implementing more robust security methods such as zero trust, there is a lack of highly-skilled cybersecurity professionals to implement and manage complex security methods. Read the blog to gain insight on the various cybersecurity certifications that are available in cryptography, SecOps and other cybersecurity disciplines.

Read More...

Why the Financial Services Industry Needs to Take Cybersecurity More Seriously

Financial services firms are in an adapt-or-die industry and need a more concerted approach to combatting cybersecurity issues. Read the blog to gain insight on the increased commitment the sector needs to fight the evolving threat landscape.

Read More...