Blog & Resources

Network Security Is an Inside Job

Insider threats don’t have to be malicious to be costly. Employee workarounds and policy violations create significant security risks.

Remote work has brought many benefits to both employees and employers, but it has also heightened security threats.

PC Upgrades Pay Off

Keeping Windows 10 PCs up-to-date can help organizations reduce costs, increase productivity and improve security.

Is a penny saved really a penny earned? Not when it comes to running outdated PCs. Research shows that trying to wring the last bit of usefulness out of desktop and laptop computers ultimately results in maintenance, productivity and security expenses that far outweigh hardware replacement costs.

Say Goodbye to Adobe Flash Player

Say Goodbye to Adobe Flash Player

New Year’s Eve celebrations are likely to be tamer than usual this year due to social distancing requirements, but IT professionals everywhere will probably still break out the noisemakers and confetti. When the clock strikes midnight, they’ll finally be able to say goodbye and good riddance to the security-plagued Adobe Flash Player.

Study: Repetition Key to Phishing Awareness Training

Phishing awareness training is designed to educate employees about how to spot fraudulent emails and text messages designed to steal sensitive information and data. However, a new study by researchers from several German universities suggests the effectiveness of such training is short-lived.

4 Ways Contact Centers Can Improve Data Privacy

When asked why he robbed banks, the notorious thief Willie Sutton reportedly replied: “That’s where the money is.” Cybercriminals have a similarly simple motivation for targeting contact center operations — they have the best data.

Contact centers capture, store and process huge amounts of sensitive customer data such as Social Security numbers, payment card data, account numbers and purchase histories.

What’s Your Best Choice for Cloud Storage?

Storage has always been one of the more logical use cases for the cloud — it provides a cost-efficient and easily accessible environment with almost infinite scalability. The benefits have been particularly pronounced during the pandemic, allowing companies to ensure their mobile and remote employees can get the files they need, whenever and wherever they need them.

Can Your Firewall Inspect Encrypted Traffic?

Two-thirds of malware attacks are encrypted, driving the need for security tools that can detect these threats without performance lags.

More and more traffic traveling across the Internet is encrypted. According to the Internet Trends Report by venture capitalist Mary Meeker, 87 percent of web traffic was encrypted at the beginning of 2019, compared to 53 percent in 2016. Data from Netmarketshare shows that encrypted web traffic exceeded 90 percent by October 2019. A Google report puts the figure at 95 percent based upon the number of web pages using the HTTPS protocol loaded into its Chrome browser.

So Long, Office 2010

As popular productivity suite is phased out, organizations should turn their focus to cloud-based Microsoft 365.

Microsoft’s popular Office 2010 productivity suite reaches end-of-life status on Oct. 13. After that date, Microsoft will no longer provide technical support, security updates, patches or bug fixes.

Just released our free eBook, 20 Signs That Your Business is Ready for Managed ServicesDownload
+