Tech Insights

rss

Contributor Columns on Information Technology and Security

All of the major IT vendors tend to have large, yearly conferences for customers, partners and media. While these tend to be promotional of course, one can still learn a fair amount about where a company sees itself going and what it's priorities are.   I had the pleasure of attending ...

From my experience and background technology, I can tell you that being a network manager can be a difficult job if you do not possess the requisite knowledge, equipment, and familiarity with networking and certain devices. A network-monitoring tool is one of the most important products to have at ...

In my experience with small and mid-size companies, I have noticed that many do not protect themselves with adequate security measures. I have also seen that most of them operate under one of the following assumptions: they are a small company, and thus of no interest to hackers, or they think ...

If you’ve seen the movie Wall Street, you’ll remember the part when Charlie Sheen confronts the gregarious Wall Street money machine played by Michael Douglas. Douglas glares at Sheen and says, “OK, pal, tell me something I don’t already know!” It is well-understood that sophisticated cyber-attacks are on the rise globally.  ...

UTM, also known as unified threat management, is a security solution that focuses on an extensive network defense for businesses and organizations. In essence, the development of UTM stemmed from a standard firewall and later evolved into an all-around, comprehensive security product that is not only able to perform a number of ...

Of all the jobs within an enterprise IT department, perhaps none is more challenging - and visible - than that of the network manager. Employees generally tend to take their company's network for granted. All they know is they log in, and the internet and all of their other ...

Near field communications (NFC) is the exchange of information between two devices via wireless signal. For example, a wireless signal emitting from your cell phone can act as a credit card when making a purchase. In the case of a mobile wallet application, those devices would be a mobile ...

Employees expect to uses their mobile devices at work, and employers often don’t mind because of the cost savings. However, being able to use personal smartphones and other mobile devices at the office creates problems for IT managers. A small business with 100 employees might have an additional 300 ...

WiFi connects us everywhere, such as in parks, subways, airplanes, coffee shops and public WiFi hotspots. The WiFi Alliance says there are more than a million hotspots worldwide, and a report by market research company Informa Telecoms and Media (Informa.com) reports that Wifi hotspot numbers are set to grow to 5.8 ...

When traveling on business or for pleasure, seeking out a reliable WiFi connection is usually a priority for most travelers. While mobile 3G/4G connections satisfy some, the speed of WiFi for laptops or uploading/downloading larger files doesn’t compare. NBC news reports, “More and more hotels are stepping up and offering guests ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its