by Nate Fair | Apr 20, 2020 | Security
Back view of Asian business woman talking to her colleagues about plan in video conference. Multiethnic business team using computer for a online meeting in video call. Group of people smart working from home. Chances are you have just been thrust into the throes of...
by Brian Kubas | Apr 16, 2020 | Security
Virtual Private Network (VPN) Transacting on an unsecured network means you could be exposing your private information. VPN services establish secure and encrypted connections to provide greater privacy than even a secured Wi-Fi hotspot. That’s why a virtual private...
by Eric Vibberts | Apr 16, 2020 | Security
Endpoint protection platforms (EPP): Endpoint protection, or endpoint security, describes cybersecurity services for network endpoints, like laptops, desktops, smartphones, tablets, servers, and virtual environments. These services may include next-generation...
by Leo Cronin | Mar 27, 2020 | Security
This crisis we are in is not over, and although we have been talking about pandemic response for as long as I have been around security and BCP teams, it is very hard to anticipate, plan for, and react to black swans. The responses to COVID-19 and the structural...
by Justin Hall | Mar 27, 2020 | Security
After the smoke clears and we’re all allowed to go to bars again, organizations will be trying to answer a few questions. How well did we deal with this crisis? What have we learned? What changes for us the next time we have a similar crisis? Did what we just...
by Jeff Swann | Mar 26, 2020 | IT Solutions, Security
Digital Transformation is defined as the process of exploiting digital technologies and supporting capabilities to create a robust new business model which is led by executive management or at the board level. With the onset of the Covid-19 pandemic, we have an...