The Way of the Future: Working From Home (Part 2)

Businesses that can safely stay open with remote workforces have largely transitioned to work-from-home scenarios because of the COVID-19 crisis, and in part one of our blog we focused on these system enhancements to support remote work: Cloud Collaboration Access and Monitoring Virtual Desktop Infrastructure (VDI) Bandwidth/Firewall Upgrades to Enable Virtual Private Networks (VPN) But […]

Read more

The Way of the Future: Working From Home (Part 1)

Now that businesses have largely transitioned to working remotely, we can all sit back, relax, and enjoy worry-free, comprehensive communication…right? Wrong! Other system enhancements are needed that can make – or if ignored – potentially break your network while working from home.

Read more

Cybersecurity tips for working remotely

Remote work policies have become a necessity not just because of the current state of affairs, but also for the ways they improve a company’s bottom line and efficiency. Yet despite remote work’s benefits, it leaves you and your company exposed to online scams and other cybersecurity threats.

Read more

SD-WAN Security: Built-in is better than bolt-on

Securing enterprise data and business applications is undoubtedly at the forefront of every IT professional’s mind. However, efforts to secure data and applications competes with the priority to open up resources for a distributed workforce by moving applications and data to multiple cloud and SaaS platforms.

Read more

Secondhand IoT Devices, Firsthand Threats to Security

From thermostats and voice assistants to fitness trackers and toys, smart and internet-connected gadgets are now found in nearly every room of most homes. It’s tempting to try and save money on these devices by capitalizing on less expensive secondhand products sold by third-parties like eBay, Craigslist and even friends or family.

Read more

Security Multi-Tenancy Part 1: Defining the Problem

Pre-Virtual Virtual Firewalls Nowadays, everyone likes to talk about network function virtualization. Most security vendors build their firewall products to run on a few popular hypervisors. However, the “virtual firewall” term predates this virtualization craze.

Read more

Windows Exploitation and AntiExploitation Evolution

Windows has been a target of hackers for a long time. The reason is simple: it is the OS with the largest deployment footprint around the world. Hackers discover vulnerabilities in Windows OS software as well as the various software that support Windows OS. Exploits as well as exploit mitigation techniques have evolved over the years.

Read more

GDPR Considerations for Companies Outside the European Union

On May 25th, 2018, the General Data Protection Regulation (GDPR) becomes enforceable under law in the European Union (EU). It fundamentally changes how businesses (and the public sector) must handle information relating to their customers, giving greater protection to individuals and harmonizing the laws for data-handling across the EU. So, if this is an EU law then, […]

Read more