Our Blog

Is Your Firewall Able to Protect against the Latest Threats?

Your business depends upon Internet connectivity to exchange information and access cloud services. Hackers rely on the Internet, too, as a means of distributing malware, stealing sensitive data and engaging in other malicious activity. Your…

Business Email Compromise Costs Companies Billions and Brings Potential Legal Liability

In a recent post, we noted that 87 percent of IT decision-makers and C-level executives surveyed recently reported seeing email impersonation attacks that asked the recipient to wire money. These kinds of attacks, known as “business email…

The Facebook Hack: What Happened and Why Businesses Should Be Concerned

Here’s the latest on the Facebook hack that compromised 30 million user accounts, down from the original estimate of 50 million. Three vulnerabilities in Facebook’s “View as” feature, which allows users to see their profiles as other…

How IT-as-a-Service Shifts the Conversation from Technology to Business Value

Very few organizations have the resources and expertise to build and manage a traditional IT architecture. That’s why more workloads and applications continue to the move the cloud. The cloud can provide small to midsize businesses (SMBs)…

End-of-Life Networking Equipment Puts Your Organization at Risk

According to a recent study by Softchoice, 73 percent of organizations are using network devices that end-of-sale, up from 60 percent the previous year. In addition, 6 percent have gear that’s end-of-life, up from 4 percent the previous year. End-of-sale…

The Growing Threat of DDoS Attack and What to Do about It

A new report from Corero finds that distributed denial of service (DDoS) attacks are on the rise. In a DDoS attack, hackers flood networks with illegitimate traffic in order to sap bandwidth and prevent legitimate users from accessing computer…

Why Microsoft Azure Adoption Is Outpacing Other Cloud Providers

When it comes to public cloud services, Amazon Web Services (AWS) has been the undisputed king for quite some time. However, RightScale’s State of the Cloud report for 2018 finds that Microsoft Azure is making up ground quickly. While AWS…

How Multifactor Authentication Helps Overcome the Weakness of Passwords

If you look at the biggest data breaches of the past few years, many of them didn’t rely on sophisticated technology to gain access to sensitive systems and data. They just stole a legitimate user’s login credentials or tricked users into…

How ICG Helps Protect You against Today’s Email-Borne Threats

Email remains popular among hackers as a means of distributing malware and launching phishing and impersonation attacks. In a survey of IT decision-makers and C-level executives conducted by research firm Vanson Bourne, 56 percent of respondents…

Why Security Awareness Training Is Essential to Reducing Cyber Risk

The grim reality of today’s IT security threats and the risks they create are no secret. Many organizations have invested in new security tools and services to beef up their defenses. Unfortunately, the best technology in the world can’t…