Is Your Organization Affected by Spectre or Meltdown?

By Jennifer Hooper on Jan 17, 2018 4:50:18 PM

This past week’s news regarding security vulnerabilities in modern processors, known as Spectre and Meltdown, has made many technologist and business owners feel on edge and wondering, “How do I tackle this issue?”

Continue Reading

We'll be at Angelbeat. Will You?

By Jennifer Hooper on Sep 13, 2017 10:04:00 AM

Jeff Forsyth, VP Application Services at Versatile, will be speaking at Angelbeat in Boston, MA and Portland, ME this month. Versatile is one of Microsoft's most highly regarded partners in New England. Jeff will present "Secure Migration & Deployment of Office 365 / Public Cloud Applications," as well as provide answers and practical recommendations on this critically important topic.

Continue Reading

Is The Wolf at YOUR Door?

By Jennifer Hooper on Jul 24, 2017 10:21:50 AM

Security is a topic we take seriously. 

One area of security that is often overlooked in organizations is network printers; they're vulnerable targets for hackers wanting to compromise your network and organization. 

Check out this captivating video, starring Christian Slater, to watch an alarming scenario unfold, then download our white paper, Print Security: Are Your Printers Being Exploited?  

Take the first steps toward protecting your organization today!

Continue Reading

Can You Afford a Printer Data Breach?

By Jennifer Hooper on Jun 15, 2017 11:45:51 AM

Cyber hackers and data thieves can easily exploit the security vulnerabilities of networked business printers. But most organizations have no idea how much even a single data breach can cost. Once you understand the enormity of what’s at stake, you'll want to tighten up your printer security. We can help you avoid this scenario.

Continue Reading

Taking a Mobile-first Approach to Network Security

By Jennifer Hooper on May 30, 2017 10:21:21 AM

As more corporate applications and data are being accessed via employee devices, cloud connections, and IoT, it’s no surprise that more cyber-attacks are being aimed at networks and the devices connected to them. Recently, network attacks hit one-third of executive devices. Hackers even created a new attack, the Mirai botnet, which leverages digital cameras, DVD players, and other IoT devices to launch sustained DDoS attacks – a weapon that was used to crash the websites of companies such as Twitter, Dyn, the Guardian, Netflix, CNN, and more. And of course, there's the WannaCry cyberattack that compromised thousands of Windows computers just this month.

Continue Reading

Stay Relevant with a Solid Digital Transformation Strategy

By Jennifer Hooper on May 18, 2017 8:00:00 AM

In previous blog posts, we talked about why organizations should be exploring and understanding the role of digital transformation in attracting and retaining customers, and why CIOs and CMOs should be forming close partnerships. This blog post is all about staying relevant. It’s part 3 of a 3-part series about digital transformation.

In today's digital world, organizations need to put customers at the center of their digital transformation strategies. It means understanding customers' purchasing behaviors and desired digital experiences and building strategies around them. If your organization can't meet—or surpass—your customers' expectations, another organization will.

Continue Reading

5 Key Takeaways from Cisco Live 2016!

By Richard Purizaca on Aug 5, 2016 1:29:33 PM

By Richard Purizaca *

From the opening keynote speech by Cisco CEO Chuck Robbins, who energized the crowd with a wealth of information, to the closing notes by Kevin Spacey, who keyed up pure excitement as he conveyed how "your journey” and “your story” empowers your brand and separates you from your competitors, Cisco Live 2016! was an incredible event. Other themes that emerged throughout the event included be the differentiator and challenge the norm, break barriers and keep reaching. But in my field of Engineering and Architecture, my favorite subjects fell within the Engineering Design, Network Security and Architectural space. Here are 5 key takeaways announced at Cisco Live 2016!

Continue Reading

IT Roundtable. Knights Wanted.

By Jennifer Hooper on Jun 6, 2016 4:41:48 PM

As CIO, IT Director, or Security Specialist you already know that vulnerabilities on your network are targets for exploitation. What about industry compliance? Keeping up with security concerns is a never-ending process. Are you doing enough? Have you addressed all the pain points? IS your network secure?

Continue Reading

5 Considerations for a Solid Security Strategy

By Jennifer Hooper on May 23, 2016 11:54:56 AM

Stolen credit cards. Ransomware extortion. Corporate espionage. Every week, there’s a story in the news about a security breach at a major corporation. Last week, hamburger joint Wendy’s announced a malware infection, joining a growing list of organizations that have suffered from security compromises including Home Depot, Target, Neiman Marcus, and others.

Continue Reading

How Secure is Your Mobile Strategy?

By Jennifer Hooper on Apr 18, 2016 3:24:34 PM

As mobile and cloud solutions continue to emerge on the IT landscape, security concerns are (rightfully) on the minds of organization leaders. CIOs and Security Officers have their hands full trying to keep up and navigate through the noise to settle on the right trends and protocols for their organizations.

Continue Reading

Lists by Topic

see all

Posts by Topic

see all

Recent Posts