Blog & Resources

The No. 1 Thing You Can Do to Combat Phishing Attacks

According to the FBI’s Internet Crime Complaint Center (IC3), more than 26,000 users fell victim to phishing, vishing, smishing and pharming attacks in 2018, suffering more than $48 million in financial losses. All four types of attack use social engineering to trick users into giving up sensitive information, clicking on a malicious link or attachment, or visiting a malicious website.

Unified Video Conferencing: Deeper Relationships, Greater Efficiency

If there has been one perceived drawback to advances in communication technology, it has been that emailing, texting and instant messaging has replaced face-to-face communication. As a result, relationships aren’t as strong as in the past. Thanks to the emergence of video conferencing as a core collaboration technology, this trend is being reversed.

Artificial Intelligence

Transcending fantasy, AI concepts expanding into real-world usage.

Artificial intelligence (AI) is usually associated with human-like computers such as Isaac Asimov’s positronic robots and the Star Wars droids. In truth, AI has moved way beyond the realm of fantasy and into the mainstream thanks to a range of new products, technologies and applications.

Knowledge Is Power

Security training plays a critical role in improving an organization’s cybersecurity posture.

Small to midsize businesses (SMBs) are aware of the dangers of cyberattacks, and most are doing everything they can to beef up security. But is that enough?

Installing antivirus software and occasionally warning employees not to open suspicious emails won’t protect sensitive data or satisfy a growing number of regulatory requirements.

Optimizing Cloud

As cloud spending and governance issues mount, more organizations turn to managed services providers.

It is now almost universally accepted that cloud computing is the ideal model for the consumption of IT resources. According to the RightScale 2019 State of the Cloud Report from Flexera, 94 percent of businesses across all verticals are using cloud in some form, 84 percent have a multi-cloud strategy using an average of five different cloud platforms, and almost 80 percent of all workloads now run in the cloud.

E-Rate Can Give K-12 Security a Much-Needed Boost

K-12 schools are collecting and storing more and more information about students, including personally identifiable information, behavioral assessments and health data, as well as grades, test scores and attendance. This data is a critical resource for evaluating students and developing personalized learning programs.

Study: Personally Identifiable Information Is Compromised in 97% of Breaches

According to a recent report on data breaches in the U.S., the personally identifiable information (PII) of consumers remains the top target of cybercriminals. A whopping 97 percent of all breaches in 2018 involved the exposure of PII. Almost half (48 percent) of breaches affected the healthcare sector, while the cost of breaches in the financial sector jumped from $8 million in Q1 2018 to $6.2 billion in Q1 2019.

The increased exposure of PII comes despite a 12.4 percent increasein spending on security products and services.