According to a recent Gallup poll, about half of the U.S. full-time workforce say their jobs can be done remotely, at least on a part-time basis. Forty-two percent of those working remotely have a hybrid schedule, while 39 percent work from home full-time.
The Hybrid Workplace Is the Future. Here’s How to Get There.
Cybercriminals Targeting Unpatched Vulnerabilities

Despite months of dire warnings about the threat potential, researchers say the vast majority of vulnerabilities in the widely used Apache Log4j logging utility for Java software remain unpatched and actively exploited. New research suggests that more than 90,000 Internet-facing Java applications and nearly 70,000 servers remain exposed to the flaw that enables attackers to remotely execute code on compromised systems.
Hide and Seek
Backup Challenges

A look at multiple options for closing the gaps in data backup operations.
Today’s increasingly distributed work environments create new challenges for already complicated data backup processes. With more data — and more types of data — being generated and stored across multiple data centers, cloud platforms and endpoint devices, the vast majority of companies are dealing with significant gaps in their backup operations.
Save Time and Money with HPE Purchases Through NASPO Contract

As we discussed in our last post, cooperative procurement contacts help government agencies, educational institutions and some nonprofit organizations save time and money on technology acquisitions by aggregating purchasing power. Analysts say state and local governments save more than $300 billion of taxpayer dollars each year through increased purchasing efficiencies.
Optimize IT Spending with Cooperative Purchasing Contracts
Mobile Device Management Combats Surging Levels of Mobile Malware

The smartphone is a remarkable device — a telephone, computer, web browser, camera, fitness tracker, personal assistant, navigation system and media player all wrapped up in a pocket-sized package. It’s no wonder that surveys regularly find that people would rather go without cars, televisions or even food than give up their smartphones.
The Surprising Risks of Unsecured Printers and Multifunction Devices

The international hacktivist group Anonymous recently claimed it hacked hundreds of unsecured printers throughout Russia, using them to distribute anti-war messages. Despite their good intentions, the incident is just another reminder that printers, fax machines and multifunction devices are far more vulnerable to malicious exploits than most people realize.
Who Goes There?

Identity-based security solutions support the zero-trust model and address evolving threat landscape.
Remote and hybrid work arrangements have become commonplace, with people across the globe now using a mixture of personal and company-owned devices to access data and applications from the corporate data center, public clouds, private clouds and the open Internet.