Much has been written about the evolution of the cybercriminal. Young hackers who attacked websites just for thrills have grown into well-organized, well-funded criminal operations. The dark web has created a marketplace for hacking tools and collaboration.
In Search of Better ROI, Hackers Turn to Cryptojacking. Here’s Why That’s a Problem
Endpoint Protection
Evolving threats require smarter, more automated endpoint security solutions.
Employees today are increasingly likely to work from outside the office, employing a variety of endpoint devices including desktop computers, laptops, tablets and smartphones to complete business tasks.
A New Way to WAN
Software-defined WAN solutions help to reduce costs and streamline operations through flexibility, consolidation and centralized management.
The wide-area network (WAN) has become one of the most critical components of the IT infrastructure, enabling organizations to gain access to cloud resources and connect remote locations and workers to headquarters.
The Changing View of Video Surveillance
IP-based video surveillance solutions provide greater flexibility and functionality than traditional analog systems.
Video surveillance cameras have become a ubiquitous part of the landscape as organizations and consumers alike seek to deter crime and document security-related events.
How Standardization Simplifies IT Management and Security
An employee goes to IT with a special request. Maybe they need an application reconfigured or want to use an entirely new application, device or operating system. IT fulfills the request to make the employee happy and everyone goes about their business.
Keys to Overcoming the Challenges of Remote Worker Security
Remote working no longer conjures images of someone wearing pajamas and sipping the world’s biggest cup of coffee while occasionally making phone calls. More and more employees are working remotely all or part of the time, taking advantage of the flexibility enabled by today’s technologies.
Technology Considerations When Planning Your Business Relocation
Relocation could very well be an essential step in the growth of your business. If you’ve gone as far as you can go in your current market, you’re struggling to find talent that can take you to the next level, or you’ve simply outgrown your space, the answers to these problems probably can’t be found in your current location.
Verteks Consulting Donates Mitel Connect System to Boys & Girls Clubs of Marion County
Press Release - Ocala, Florida, April 12, 2019 – Verteks Consulting today announced the donation of a Mitel VoIP phone system valued at $12,540 to the Boys & Girls Clubs of Marion County. This donation is the latest in a series of investments Verteks has made in the Boys & Girls Clubs, with Verteks donating over $110,000 in IT products and services to the Marion County Clubs over the past 10 years.
Credential Stuffing: A New Twist on the Old Password Problem
Analysis of about 61 million passwords from more than 28 million users by Virginia Tech University and Dashlane found that 52 percent of users have identical or very similar passwords for multiple accounts. Even when a breach has been reported and users know their passwords have been compromised, more than 70 percent continue to use those passwords for up to a year.
The Clock Is Ticking on Windows 7. What’s Your Migration Strategy?
Last fall, Microsoft announced that paid Windows 7 Extended Security Updates would be available on a per-device basis through January 2023. Essentially, these are the security patches Windows users receive for free while the operating system is supported.