Blog & Resources

What’s Your Best Choice for Cloud Storage?

Storage has always been one of the more logical use cases for the cloud — it provides a cost-efficient and easily accessible environment with almost infinite scalability. The benefits have been particularly pronounced during the pandemic, allowing companies to ensure their mobile and remote employees can get the files they need, whenever and wherever they need them.

Can Your Firewall Inspect Encrypted Traffic?

Two-thirds of malware attacks are encrypted, driving the need for security tools that can detect these threats without performance lags.

More and more traffic traveling across the Internet is encrypted. According to the Internet Trends Report by venture capitalist Mary Meeker, 87 percent of web traffic was encrypted at the beginning of 2019, compared to 53 percent in 2016. Data from Netmarketshare shows that encrypted web traffic exceeded 90 percent by October 2019. A Google report puts the figure at 95 percent based upon the number of web pages using the HTTPS protocol loaded into its Chrome browser.

So Long, Office 2010

As popular productivity suite is phased out, organizations should turn their focus to cloud-based Microsoft 365.

Microsoft’s popular Office 2010 productivity suite reaches end-of-life status on Oct. 13. After that date, Microsoft will no longer provide technical support, security updates, patches or bug fixes.

Are Consumer-Grade File-Sharing Services Putting Your Data at Risk?

It has always been difficult to keep documents up-to-date and ensure that everyone on your team has the right version. Now that many employees are working remotely and sharing documents via mobile devices, the problem has only become more acute.

Cloud-based file-sharing services such as Dropbox, iCloud and Google Drive seem to provide a simple solution.

5 Tips for Boosting Your Wi-Fi Performance

Worldwide Wi-Fi traffic has surged to record levels as business, governments, schools and hundreds of millions of people have become reliant on their wireless networks. The increased traffic volume has also brought performance challenges, with increased reports of dropped connections, slow downloads, increased interference and broadband restrictions.

Beyond Backup

Data protection is just one component of a disaster recovery plan.

What would happen to your business in the event of a disaster?

According to experts, the vast majority of business owners would respond, “I don’t know.” The sobering reality is that very few businesses have disaster recovery (DR) plans — of those, very few are complete and up-to-date.

Total Recall

Single sign-on gives end-users just one strong password to remember to access multiple applications and services.

Human memory is fickle. We forget the name of someone we just met, where we parked our car at the mall, even our anniversary. Remembering passwords just adds to the burden.

Why You Need a Cybersecurity Incident Response Plan

Virtually all companies today depend on computer networks to link employees, suppliers and customers, exchange information and facilitate a variety of essential day-to-day tasks. Unfortunately, that makes them susceptible to cyberattacks. It’s why all companies need an incident response (IR) plan — a structured process for detecting, responding to and recovering from cybersecurity incidents.