By Alan C. Brawn CTS, DSCE, DSDE, DSSP, ISF-C In the beginning of technology sales, we sold features. In those days this was the “wow” factor revealing things that has heretofore been non-existent or impractical. As new technologies seemingly came out of the woodwork, buyers became more knowledgeable and sophisticated and as a result the […]
The latest teaching exercise that I have been working on relates to what economists call the “commodity trap.” The danger for us in the commercial AV industry is that if everything appears the same… the differentiation then becomes price.
From our IM Link Preferred Partner, Fast Lane Training Do you wish you could use just one comprehensive tool to monitor the performance of your network, devices, users and applications? Also, do you wish you could wave a magic wand to identify and resolve problems as they occur? Want to do all of these but […]
As an IT Professional, you know the value of having a strong security posture; you’ve got your firewalls in place, endpoint protection on all your employee laptops, and appropriate access measures in place to ensure that only the right people have access to secured documents and data…but did you know that a large portion of […]
We all do whatever we can to stay safe, especially on the internet. But what if we were letting people past our security because of our human nature?
The value proposition for this service may have originated in sustainability, but cybersecurity is beginning to edge out environmental concerns as the top reason for organizations to adopt ITAD.
Cybercriminals are always looking for new ways to undermine your cybersecurity. To be successful, these attackers rely on your ignorance of common cyberattacks. This article will give you a high-level overview of three routine attack vectors that anyone who uses the internet can fall prey to. DDoS A Distributed Denial of Service (DDoS) attack is […]
With data breaches happening with increasing frequency, cybersecurity has steadily climbed to the forefront of the public consciousness. Many of the successful attacks that make into the news are perpetrated by attackers using malware. We briefly touched on what malware is in our previous post The Cybersecurity Threat Landscape, but the topic bears exploring further. […]
Here, you’ll receive a high-level view of the major threats to our end users’ businesses to help you understand the current threat landscape including the most prevalent types of attacks and attackers and the key factors enabling them.
What is Cybersecurity? The days of museum robberies and bank heists are mostly a relic of the past. These days, the most valuable targets are data. Stealing personal and other sensitive data typically exposes the thief to less danger, and data is oftentimes much easier to access. In many cases, a data theft can be […]