by Christine Thome | Sep 11, 2019 | Backup, Infrastructure, mobile threats, Security
Are we going to pay?” This is how many conversations about ransomware get started, hopefully before falling victim to an attack. In making that decision, companies will evaluate what goes into a ransomware defense program, what risk level they will accept, and how...
by Christine Thome | Aug 7, 2019 | mobile threats, Security
The expanding cyber threat landscape puts organizations at more risk of being attacked than ever before. As a result, enterprises must constantly monitor the threat landscape and be ready to respond to security incidents, data breaches, and cyberthreats when they...
by Christine Thome | May 1, 2019 | Infrastructure, mobile threats, Networking
Originally published on IoT for All, February 26, 2019 Thanks to two new wireless standards rolling out this year—WiFi 6 and 5G—2019 is shaping up to be a watershed year for the Internet of Things (IoT). These new technologies are expected to revolutionize IoT, and...
by Paul Comfort | Feb 12, 2019 | Cloud, mobile threats, Security
Several readers asked Paul Comfort, Chi’s Lead Engineer, to follow up his November 2018 Company Email vs Personal Email article with his thoughts on forwarding company email to a personal account. If you have a tech or corporate question you’d like Paul...
by Christine Thome | Jan 9, 2019 | mobile threats, Security
Originally published in PC World, December 18, 2018, by Brett Raphael, Managing Director of Australia & New Zealand, CrowdStrike Gartner’s latest global forecast for spending on information security products and services shows spending across the world is set to...
by Paul Comfort | Jul 16, 2018 | Infrastructure, mobile threats, Security
Twenty years ago, if you mentioned spam and phishing in the same sentence, one would assume you were enjoying some time on the lake and a sandwich made from canned meat. In today’s IT world, those words have much more menacing meanings (although the canned meat...