by Christine Thome | Dec 5, 2019 | mobile threats, Security
In today’s collaborative, mobile world, employees are constantly looking for new and better ways to get their work done. Whether it’s checking email on personal devices or sharing files via cloud-based apps, they’re bypassing IT-sanctioned technology...
by Christine Thome | Nov 8, 2019 | Infrastructure, mobile threats, Security
Few things are as ominous in today’s digital landscape as a data breach. I know this firsthand through my work in the insider threat detection and monitoring space. Not only do data breaches come with an immense cost, estimated at close to $4 million, but shifting...
by Christine Thome | Sep 11, 2019 | Backup, Infrastructure, mobile threats, Security
Are we going to pay?” This is how many conversations about ransomware get started, hopefully before falling victim to an attack. In making that decision, companies will evaluate what goes into a ransomware defense program, what risk level they will accept, and how...
by Christine Thome | Aug 7, 2019 | mobile threats, Security
The expanding cyber threat landscape puts organizations at more risk of being attacked than ever before. As a result, enterprises must constantly monitor the threat landscape and be ready to respond to security incidents, data breaches, and cyberthreats when they...
by Christine Thome | May 1, 2019 | Infrastructure, mobile threats, Networking
Originally published on IoT for All, February 26, 2019 Thanks to two new wireless standards rolling out this year—WiFi 6 and 5G—2019 is shaping up to be a watershed year for the Internet of Things (IoT). These new technologies are expected to revolutionize IoT, and...
by Paul Comfort | Feb 12, 2019 | Cloud, mobile threats, Security
Several readers asked Paul Comfort, Chi’s Lead Engineer, to follow up his November 2018 Company Email vs Personal Email article with his thoughts on forwarding company email to a personal account. If you have a tech or corporate question you’d like Paul...