Blog & Resources

Cooperative Tech Purchasing

Business and IT leaders now collaborate on difficult buying decisions. Third-party providers can help.

It wasn’t that long ago that IT departments were essentially technology fiefdoms, largely independent of the rest of the organization with a few key managers having almost total authority over operations.

Improve Threat Detection and Response with WatchGuard

In a recent post, we described many of the techniques that malware authors are using to disguise their attacks. In this post, we’ll take a closer look at how WatchGuard Technologies uses data analytics to identify and expose these stealthy exploits.

As described in the earlier post, cybercriminals today employ code obfuscation, polymorphism and other techniques to create malware that can constantly change its identifiable features.

Protect SaaS Data with Cloud-to-Cloud Backup

Software-as-a-Service (SaaS) is rapidly becoming the preferred choice for new software deployments as organizations seek the flexibility and cost benefits of the cloud delivery model. One recent study finds that organizations now use an average of 16 SaaS business applications and plan to increase that number substantially over the next three years.

Aging Firewalls Create Risk

Outdated perimeter defenses offer minimal protection from sophisticated new cyber threats.

Firewalls have been the linchpin of network security for decades, serving as the essential gatekeeper between internal network resources and the outside world.

Reliability Is Key

SMBs say reliability is the first thing they seek when choosing a cloud-based phone system.

There are a lot of good reasons for putting your phone system in the cloud. It saves capital costs, offloads much of the phone system management burden, creates access to advanced features and is extremely scalable.

Government Agencies Seek Modernization with Hybrid Cloud

Bloomberg analysts report that cloud computing will be the top government IT spending category over the next several years. Most government CIOs say this is a welcome development. In an age of increasing digitization, government agencies are finding it difficult to support their constituents with aging infrastructure.

Office 365 Security – Top 5 Security Steps

Office 365 is a great cloud productivity suite that brings benefits to all its users – I use it myself and I love it. As with any technology it’s important to evaluate cyber security risks and take appropriate measures to reduce risk and improve security. Based on my experience and what we’ve seen in client engagements, here are my top 5 cyber security recommendations for Office 365:

Cybersecurity 2020: Focus on These Five Threats

As we approach the new year, information security consultants, analysts and futurists are once again attempting to identify the threats most likely to create damage in the coming months. While emerging threats such as AI-powered bots, deep-fake videos and 5G network attacks are among the trendy picks, a variety of old, familiar vulnerabilities will likely pose the greatest risks to businesses in 2020.

McAfee analysts claim that more than 300,000 new pieces of malware are created daily, but most of these are just tweaks of existing threats that are proven money-makers for cybercriminals.

Just released our free eBook, 20 Signs That Your Business is Ready for Managed ServicesDownload
+