Endpoint Security

5 Back-to-School Security Tips for K-12
Juanma Rodriguez
5 Back-to-School Security Tips for K-12

It’s back-to-school season and while students and their families shop for new clothes, backpacks and school supplies, teachers and administrators are also busy outfitting their schools with tools to support a productive and safe school year. There’s no question technology is a core component for creating powerful learning environments. Seventy-five percent of teachers today use technology in their classrooms on a daily basis. But with technology adoption comes risks...

READ MORE
How to Succeed in the Digital Healthcare Frontier
Josh Mayfield
How to Succeed in the Digital Healthcare Frontier

Healthcare is data. To effectively treat patients and create new forms of care, information must be shared, analyzed, and transmitted across several devices, among a number of healthcare professionals, insurance providers and other third parties. The sensitive nature of this personal information has long made healthcare an attractive target to cyber criminals while the complex nature of the industry creates continued struggles to protect the data, as frequent data...

READ MORE
3 Cybersecurity Tips for Summer Travel
Jo-Ann Smith
3 Cybersecurity Tips for Summer Travel

Just because you might be taking a vacation this summer doesn’t mean cyber thieves will do the same. As you and your company’s users prepare to close out your summer travel – for leisure or for work – it’s important to take a few simple precautions that will go a long way in the protection of your data, and your employers. Remember, the hospitality industry is a popular target...

READ MORE
Securing Shadow IT Starts with Automation
Jason Short
Securing Shadow IT Starts with Automation

Shadow IT is a modern security challenge for the very best reasons – your users rely on it to find new and arguably innovative ways to be more productive. While getting more done more effectively isn’t a bad thing, rogue applications that aren’t supported and maintained by IT is. While we haven’t seen Shadow IT in the headlines as much recently, the problem remains very real. Gartner estimated 38%...

READ MORE
How Emergency Communications of Southern Oregon Improved Security and Achieved Compliance
Kim Ellery
How Emergency Communications of Southern Oregon Improved Security and Achieved Compliance

According to a recent survey, most people (71 percent) want their state and local governments to spend more money on preventative cybersecurity measures and even more people (74 percent) think officials should take steps to better secure constituents’ personal data. Constituent demand isn’t the only demand driver however. Compliance demands also illustrate state and local governments have their work cut out for them when it comes to bolstering security....

READ MORE