Our Blog

How IT Standardization Reduces Complexity, Cost and Risk

An employee requests a new app, a new device, or a quick configuration change to help them complete certain tasks or projects. Maybe they want a Mac even though all employees have Windows machines. Hoping to keep the employee happy, IT comes…

Why Sloppy Password Practices Are the Main Ingredient in Credential Stuffing Attacks

Citrix. Dunkin Donuts. Reddit. AdGuard. Nest. TurboTax. These are just a few of the major brands that have been compromised in credential stuffing attacks in the past few months. These attacks show no signs of slowing down, according to Akamai’s…

Remote Work Security Challenges and How to Overcome Them

In a recent report from Buffer, 99 percent of survey respondents said they would like to work remotely at least part of the time for the rest of their careers. People like to have the flexibility to work from home if a child is sick or there’s…

Managed Services Enable Employees to Focus on Meaningful Work

Take note, bosses: What American office workers really want is more meaningful work and less time spent on mundane tasks that sap time, energy and productivity. In a recent survey conducted by ServiceNow, 61 percent of workers said they would…

Is Your Social Media Activity Putting You and Your Employer at Risk?

Social media can be a blessing when you use it responsibly and a curse when you don’t. On the positive side, social media allows you to build and maintain relationships, both personal and professional. On the negative side, social media can…

How Steganography Helps Hackers Hide Attacks

Remember using invisible ink as a kid to share top secret messages with your friends? Apparently, hackers remember, too, and they’re using a similar technique to hide malware. The recent VeryMal malvertising campaign, which popped up in major…

The Clock is Ticking for Windows 7 Users

Although it is only months away from essentially becoming dead technology, the Windows 7 desktop operating system remains remarkably popular. In fact, usage actually increased slightly in January. The risks associated with it are also increasing,…

New Study Reveals a Dramatic Increase in Endpoint Cyberattacks

Ponemon Institute’s 2018 State of Endpoint Security Risk report shows that most organizations’ endpoints have been hacked and the cost of a breach is going through the roof. Although endpoint security problems are no secret, the outlook…
,

The Cloud Cost Management Problem and How Managed Services Can Help

The cloud has the potential to reduce costs in a number of ways, but many organizations are allowing poor cost management to eat into those savings, according to research from Softchoice. In fact, 57 percent of survey respondents said their…

User Engagement Is Key to IT Project Success

We live in a technology-driven world. According to a recent Brookings Institute report, more than 70 percent of U.S. jobs now require at least mid-level technology competence. However, integrating new technology into an organization remains…