by Marketing | Jun 1, 2017 | Uncategorized
In April, CHI Corporation had the opportunity to host a webinar on eliminating database issues with our partners Kaminario, the leader in all-flash storage, and Soaring Eagle Database Consulting. The webinar features input and commentary from Jeff Garbus, CEO/Founder...
by Marketing | May 10, 2017 | Networking, Security
Are you leading with endpoint security? If end-user devices are not secured, any smartphone, tablet or laptop becomes a potential entry point for a cyber threat. Business Solutions recapped some of the top reasons to lead with endpoint security, particularly for small...
by Marketing | Apr 27, 2017 | Security
The 2017 IBM X-Force Threat Intelligence Index reported more than 4 billion records leaked in 2016, a number that was more than the combined total of the previous 2 years. A recent article from IBM’s Security Intelligence blog calculated the losses at more than $630...
by Marketing | Apr 10, 2017 | Uncategorized
We live in a highly interconnected world, relying on devices every day—and not just our mobile phones. Other popular devices include baby monitors, security cameras, routers and our vehicles. Unknown to the owner, some of these devices are sold to consumers with...
by Marketing | Mar 16, 2017 | Security
Ransomware is expanding to a new target. “Ransomware gangs have moved from consumer computers to health care networks, and they are likely to go after manufacturing companies next, according to researchers at the Georgia Institute of Technology.” – InfoWorld Many of...