Blog

How to transform your data security program with automation

How to transform your data security program with automation

Data security remains at the forefront of concerns for CEOs, as two of the biggest breaches in Canadian history took place in 2019, with one breach resulting in the theft of the personal information of 15 million people in Ontario and B.C. A 2019 CIRA Cybersecurity...

read more
How to achieve a successful UCaaS migration

How to achieve a successful UCaaS migration

Whether your current operations rely on a legacy public branch exchange (PBX) phone system or an on-premises unified communications platform, adopting Unified Communications as a Service (UCaaS) can transform your business by enabling cloud-based collaboration...

read more
Create an agile digital foundation for your mobile workforce

Create an agile digital foundation for your mobile workforce

A nimble, on-the-go workforce requires an equally agile digital foundation to stay competitive. Considering that an unparalleled customer experience is the ultimate goal, effective communications are key in helping your organization meet rising consumer expectations...

read more
The key factors in choosing UCaaS over traditional PBX

The key factors in choosing UCaaS over traditional PBX

For decades, Private Branch Exchange (PBX) has enabled office-based employees in Canada to connect with each other and the outside world clearly. However, PBX has become an outdated choice for modern businesses compared to Unified Communications as a Service (UCaaS),...

read more
What to look for in a cloud security partner

What to look for in a cloud security partner

Keeping a business safe from intrusion is no longer a simple matter of locking the doors at night. Cybersecurity has grown to become a significant concern for small, midsize, and enterprise-level companies alike, especially in the tumultuous climate 2020 has brought...

read more
Tips for building a comprehensive cloud security program

Tips for building a comprehensive cloud security program

Cloud technology is on the rise and is becoming more widely adopted every day. With so many enterprises transitioning their network infrastructures to the cloud, keeping their new cloud environments secure is a growing concern. Unfortunately, efforts to pin down and...

read more
How to realize maximum benefits from migrating to the cloud

How to realize maximum benefits from migrating to the cloud

There is little doubt that the cloud has become critical to success in business these days. As the need for data resources grows in order to meet surging demand for new services with greater reliability and security, many organizations have found that the only way...

read more
Why e-mail could be your top data security threat

Why e-mail could be your top data security threat

It is the rare enterprise these days that has yet to encounter a security threat. The ease with which cyberattacks can be mounted and the payoff from even a small firm, or an individual, has turned digital crime into an equal opportunity endeavor. This is why many...

read more
How to build an effective patch management program

How to build an effective patch management program

Preventing every single possible risk to your organization’s data structure may be an unrealistic goal, but with a thorough vulnerability assessment and patch management program, you can severely reduce the number of threats your operations are open to. However,...

read more
Penetration testing, Chicken Guns, and Mike Tyson

Penetration testing, Chicken Guns, and Mike Tyson

Here at OnX, we do quite a few pentests every year. I’ll note for my readers that the term is an abbreviation for penetration tests. It’s funny how many folks think the “pen” is an acronym and spell it as “PEN test,”. So let your friendly neighborhood pentester set...

read more
Why the Cloud is your key to application evolution

Why the Cloud is your key to application evolution

Like it or not, cloud computing is rapidly becoming the new normal. The automation and processing capabilities offered by cloud platforms is allowing modern enterprises to update and improve upon their proprietary applications and software at an unprecedented level of...

read more
SD-WAN: Roadmap for Software-Defined Networking

SD-WAN: Roadmap for Software-Defined Networking

The enterprise network landscape continues to be reshaped, businesses leveraging cloud-based IT, and the surge is moving clients toward software-defined networking – today more than ever before. In addition, the rising cost of traditional networking stifles...

read more
Key Factors of Building a Remote Network with SD-WAN

Key Factors of Building a Remote Network with SD-WAN

Creating and enabling a versatile, remote workforce is a common goal for many modern organizations during the COVID-19 public health crisis. Others are seeking to modernize their networks, improve their digital employee experiences, and reshape their cloud strategies....

read more
The cloud comes to the enterprise network’s rescue

The cloud comes to the enterprise network’s rescue

There is nothing like a crisis, such as the one the world is experiencing now, to demonstrate the importance of safe, reliable communications. For the enterprise, cloud networking is proving to be invaluable at a time when traffic loads and the number of endpoints is...

read more
Stepping up your UCaaS experience with SD-WAN

Stepping up your UCaaS experience with SD-WAN

Simplifying the various communication tools available to their company is a challenge for which many business leaders are seeking answers. As a result, enterprise-level organizations around the globe and across a variety of industries are catching on to the benefits...

read more
Choosing an SD-WAN solution for your business

Choosing an SD-WAN solution for your business

The benefits of Software-Defined Wide Area Networks are becoming common knowledge among decision-makers in every industry, from hospitals to retailers. With its proven ability provide stronger network performance and control over application traffic when compared to...

read more
Your Quick Guide to Conducting Secure Videoconferences

Your Quick Guide to Conducting Secure Videoconferences

Back view of Asian business woman talking to her colleagues about plan in video conference. Multiethnic business team using computer for a online meeting in video call. Group of people smart working from home. Chances are you have just been thrust into the throes of...

read more
Why Move your IBM iSeries to the Cloud?

Why Move your IBM iSeries to the Cloud?

The IBM iSeries platform is still used today by over 100,000 organizations despite it being 30-year-old technology. Industries like banking and manufacturing have depended on iSeries for their business-critical applications like advanced ERP systems. As a multiple...

read more
How a VPN protects your privacy

How a VPN protects your privacy

Virtual Private Network (VPN) Transacting on an unsecured network means you could be exposing your private information. VPN services establish secure and encrypted connections to provide greater privacy than even a secured Wi-Fi hotspot. That’s why a virtual private...

read more
Why Businesses Need Endpoint Protection

Why Businesses Need Endpoint Protection

Endpoint protection platforms (EPP): Endpoint protection, or endpoint security, describes cybersecurity services for network endpoints, like laptops, desktops, smartphones, tablets, servers, and virtual environments. These services may include next-generation...

read more
The Effects of the Coronavirus on Cybersecurity

The Effects of the Coronavirus on Cybersecurity

While we're all struggling to deal with the new reality imposed on us by those mean little viral microbes, the world carries on around us. There are a few ways we at OnX have noticed the Coronavirus impact cybersecurity. Specifically: Attackers are capitalizing on our...

read more
Considerations for remote work

Considerations for remote work

Tips and technology to enhance working from home Today's enterprise leaders understand traditional face-to-face communication isn't always the most efficient way to conduct business, especially in times of crisis. With the COVID-19 pandemic upon us, and the number of...

read more
Top considerations for Coronavirus contingency planning

Top considerations for Coronavirus contingency planning

Contingency planning during the Coronavirus outbreak As concerns mount over the global spread of the Novel Coronavirus Disease of 2019 (COVID-19), it's crucial for enterprises to have plans in place to both protect employees and continue serving shareholders. From...

read more
Improve network performance with UCaaS and SD-WAN

Improve network performance with UCaaS and SD-WAN

Success in business often depends on your network performance and ability to adapt quickly to changing circumstances. Collaboration between employees, partners, and customers is critical to achieving business objectives. As businesses migrate essential communications...

read more
Five questions to ask when choosing an SD-WAN partner

Five questions to ask when choosing an SD-WAN partner

As your company expands and deploys new technologies, your IT team may encounter siloed systems throughout your business. Fortunately, emerging cloud-based solutions can help technology staff address these issues. And as software-defined wide area network (SD-WAN),...

read more
Six security trends to watch for in 2020

Six security trends to watch for in 2020

Happy 2020! As a practitioner and consultant I’m excited to see what the year brings in terms of new technology, research, and clever Twitter and blog posts from the security community. To get the ball rolling, here are six security trends to keep your eye on as we...

read more
Six Common Goals of Cloud Based Networks

Six Common Goals of Cloud Based Networks

With so many employees in today’s workplace relying on cloud-based apps to perform their jobs, network administrators are looking for better ways to ensure access and provide the required bandwidth. Increasingly, IT professionals are discovering the improved network...

read more

Load More