by admin | Nov 23, 2015 | mobile threats, Networking, Security
I was catching up on some tech related news stories after a hectic 2 weeks of professional service engagements when I came across discussion of a New York Times article (archived version in the link; NYT allegedly pulled the original article after some negative...
by Marketing | Nov 17, 2015 | Security, Virtualization
During recent years, momentum toward cloud computing has shifted significantly. Cloud storage is now widely used by many businesses and organizations, and for good reason: It is a nimble and cost-effective option. However, with the opportunities and benefits of cloud...
by Marketing | Nov 17, 2015 | Networking, Security
We all know that cyber security is a very real issue for businesses large and small. Every company, no matter its size and scope, must have an appropriate plan and the right data protection solutions in place to protect itself from potential attacks. But do you...
by admin | Oct 19, 2015 | mobile threats, Security, Uncategorized
Scott Cunningham of the Interactive Advertising Bureau (otherwise known as the IAB, the largest collective of online advertisers responsible for ~85% of United States online ads,) made quite an interesting blog post a few days ago. In this post, he reveals some...
by Rob Oddo | Oct 15, 2015 | mobile threats, Networking, Security
While many security companies struggle to keep pace with the thousands (or even millions) of new vulnerabilities each year, Palo Alto Networks focuses on the techniques utilized with these exploits. With this approach, Palo Alto extends their advanced Zero-Day...
by Marketing | Oct 14, 2015 | Security
The primary operations of nearly all businesses rely on secure data storage and access. That is why it is essential to take the appropriate measures to protect your company data. If you do not, your company’s valuable data—an extremely important asset—could be at...