Do You Need A VPN?
June 20, 2019
A virtual private network or VPN is a great way to protect yourself while living in an increasingly connected world. A VPN application for personal computers (PCs), laptops and mobile devices acts like your own tunnel onto the Internet, keeping everyone from hackers to advertisers from seeing what you are doing or knowing how you […]
What’s New with SD-WAN?
April 29, 2019
Software-defined wide area network (SD-WAN) or SDWAN is a software-defined approach to managing your wide area network (WAN). It is frequently leveraged to load-balance other types of connections, including those from your Internet Service Provider (ISP). SD-WAN has grown into a very popular service – most service providers now offer it. Why? Because with SD-WAN, […]
What Is New with Citrix® Cloud Services?
March 25, 2019
Citrix is currently trying to migrate everyone to their cloud services. Why? Citrix Cloud services simplify the delivery and management of Citrix technologies. This helps you extend existing Citrix on-premise deployments into the cloud more efficiently and at less cost. Other benefits include creating and deploying secure digital workspaces in hours, not weeks, while placing […]
Cyber Security in Health Care Still Struggling: What You Should Know
March 18, 2019
The health care industry is still having a hard time getting its cyber security under control, despite ongoing knowledge that the sector is among the most vulnerable to attack compared to most others. It’s worth examining why the health sector faces these challenges and what can be done to remedy the problems. The Medical Sector […]
FBI To Banks: Expect A Cyber Crime Any Day Now
February 27, 2019
Preventable Action for Cyber Crime With its global crime-fighting efforts, the FBI can monitor potential criminal activity in an effort to take preventive action. One of the many important industries that the agency can protect this way is the financial sector. Recent discoveries have already prompted the FBI to issue a warning to banks and […]
Network Virtualization: Benefits For Your Business
February 4, 2019
What is Network Virtualization? Network virtualization (NV) is the process of consolidating the physical hardware of a network into a single, virtual network. This is typically done by using software containers on a single, physical, host machine to run multiple, virtual, guest machines. Network virtualization is the new gold standard for networking, adopted by businesses […]
Does “Bad Online Habits” equal Data Breach?
January 10, 2019
US Adults with These “Bad Online Habits” are More Likely to Have Experienced a Data Breach, Survey Finds A recent survey by University of Phoenix found that nearly half (43 percent) of U.S. adults have experienced a personal data breach in the past three years. Perhaps unsurprisingly, a greater number of those who had been hacked […]
Tech Industry Tariffs
December 14, 2018
Why to Purchase in 2018 Tariff Impacts Tech Industry Tariffs on Chinese imported parts increased by 10% on September 24, 2018 and are already impacting prices for customers. There may be additional tariffs imposed of up to 25% on January 1st, 2019, resulting in further price increases in Cisco Q3 FY19. A 3 to 6 month […]
Support for Windows 7 is ending.
November 30, 2018
Coming January 14, 2020 All good things must come to an end, even Windows 7. After January 14, 2020, Microsoft will no longer provide security updates or support for PCs running Windows 7. This will leave your workstations vulnerable to security threats, particularly malicious software. While the 2020 deadline may seem like it is far […]
Hackers Aren’t Your Biggest Threat
November 6, 2018
The state of information security for companies in the U.S. is scary. 2014 was a record setting year in terms of data breaches with a staggering 783 breaches reported. That means on average more than 2 breaches were reported every day in 2014. When people hear about breaches, they immediately think about hackers. Yet hacking […]
Preventing Information Security Breaches
Modern information security breaches follow a very specific pattern and most organizations are simply not designed to stop these attacks. Unfortunately they are not even able to detect them for months and sometimes years later. In short, hackers today use malware rather than direct attacks to compromise organizations like Equifax, Uber, Anthem, Target, Home Depot, […]
Traditional Firewalls vs Next-Generation Firewalls – Reasons to Upgrade
March 27, 2017
Why do you need a next-generation firewall, when you already have a traditional firewall in place? The short answer: With new technology comes better security. Limited capabilities and best effort traffic identification Traditional firewalls can only deny or allow traffic based on IP addresses, port numbers and protocols. This method does not positively identify what […]