Category

Blog
Technology and Cyber Security Priorities in The U.S. In last week’s blog post we looked at the United States’ commitment to combating cyber-risk and were encouraged to see the U.S. ranked second out of 193 countries in terms of highest commitment to cybersecurity (2017 Global Cybersecurity Index). But, which U.S. State’s are treating technology and...
Read More
Cyber Readiness of The U.S. Cyber risks are growing, both in their prevalence and in their disruptive potential, as individuals, companies and government agencies become increasingly more dependent on technology.  New and more sophisticated threats continue to emerge with cybercriminals using artificial intelligence and machine learning to conduct attacks.  In addition, the explosive growth of...
Read More
Cyber Security Education and How Your Employees Can Be a Company’s Greatest Asset or Risk Employees are at the heart of every business and can be a company’s greatest asset or its biggest threat when it comes to securing sensitive data and information. Lack of employee cyber security education and awareness, along with human error...
Read More
Wireless mobile communication technologies continue to evolve and have completely transformed the telecommunications industry in the last few decades. New mobile communications technologies come around roughly every ten years and with every new “generation” come a multitude of benefits offered by the convenience of mobility. The next generation — 5G, the fifth generation of wireless networks...
Read More
Holistic Cybersecurity Whatever industry you are in, regardless of business size, holistic cybersecurity must be considered a top priority and an integral part of the digital transformation journey. Most organizations are aware of the need to allocate resources to protect themselves from information security breaches, data loss, fraud, and financial loss and have focused on...
Read More
Why Your Business Needs to Consider an SD-WAN Solution With the rapid uptake of cloud services, mobile technology, social media, SaaS, big data, and IoT, the way that users are connecting to and moving data around has changed. In today’s cloud-first environments users across different offices need to connect to various cloud platforms, applications, and...
Read More
Keys To Digital Transformation Success Digital transformation is a powerful business enabler and can pay off handsomely when it is considered and acted upon as a top priority. The key drivers of digital transformation are profitability, customer satisfaction, and increased speed-to-market according to a Forrester Consulting research study commissioned by Accenture. Digital transformation allows businesses to...
Read More
Security Predictions From Around The Web It’s that time of year again when we look back on the year past and contemplate the year ahead. 2017 has been another year of massive data breaches and this trend is not set to slow down in 2018 and beyond.  Looking forward to the year ahead we see...
Read More
The US Federal Communications Commission’s (FCC) vote to repeal the regulation commonly known as net neutrality has left many Americans wondering what it means for them. Just two years after rules went into effect, Thursday’s vote to end net neutrality means that the FCC will no longer regulate Internet Service Providers regarding tiered pricing and...
Read More
Third Party Risks There is a growing number of security threats linked to third party supplier and contractor access and over the last few years the media spotlight has shone on high-profile companies, such as Equifax, Yahoo, Target, Goodwill, Home Depot and Uber. The latest high-profile company to make media headlines is PayPal for a...
Read More
1 2 3 4 5