Our Blog

New Study Reveals a Dramatic Increase in Endpoint Cyberattacks

Ponemon Institute’s 2018 State of Endpoint Security Risk report shows that most organizations’ endpoints have been hacked and the cost of a breach is going through the roof. Although endpoint security problems are no secret, the outlook…
,

The Cloud Cost Management Problem and How Managed Services Can Help

The cloud has the potential to reduce costs in a number of ways, but many organizations are allowing poor cost management to eat into those savings, according to research from Softchoice. In fact, 57 percent of survey respondents said their…

User Engagement Is Key to IT Project Success

We live in a technology-driven world. According to a recent Brookings Institute report, more than 70 percent of U.S. jobs now require at least mid-level technology competence. However, integrating new technology into an organization remains…

Don’t Be Duped by ‘Scareware’

One of the top cybersecurity threats to arise in recent months isn’t technically malware but “scareware” targeting Apple Mac devices. It is distributed primarily via phishing emails that try to convince victims that their systems are…

Why Email Encryption Is a Must, and What an Effective Solution Looks Like

If data is indeed the lifeblood of any organization, then there is no greater risk than having sensitive data accessed or stolen by unauthorized users, particularly those with malicious intent. Most organizations focus on protecting data that’s…

Office 365 Phishing Attacks Are on the Rise. Here’s What You Need to Know.

Phishing attacks are as old as email. Remember getting emails saying that a sultan from a country you never heard of wanted to transfer $10 million to you if you would only provide your bank account number? The old attacks were almost comical…

Your 6-Step Blueprint for Preparing the IT Security Budget

You probably look forward to preparing a budget about as much as a root canal. The budget process pulls you away from core business activities, and it often creates stress and tension as difficult decisions are made. The IT budget in particular…

Why Shadow IT Is Getting Worse, and What You Can Do about It

Shadow IT is a growing problem, especially with the emergence of the cloud. Users can easily obtain cloud services simply by filling out a form and entering a credit card number. In fact, Gartner estimates that shadow IT comprises 30 percent…

Is Your Firewall Able to Protect against the Latest Threats?

Your business depends upon Internet connectivity to exchange information and access cloud services. Hackers rely on the Internet, too, as a means of distributing malware, stealing sensitive data and engaging in other malicious activity. Your…

Business Email Compromise Costs Companies Billions and Brings Potential Legal Liability

In a recent post, we noted that 87 percent of IT decision-makers and C-level executives surveyed recently reported seeing email impersonation attacks that asked the recipient to wire money. These kinds of attacks, known as “business email…