The In’s and Out’s of Endpoint Security

Author: Andrew Whitt | Security Expert What is Endpoint Security? Endpoint security refers to defending network endpoints, or end-user devices like desktops, laptops, and mobile devices. Endpoints serve as points of access to an enterprise network and create points of entry that can be exploited by malicious actors. Endpoint security software protects these points of […]

Desktop Operations Support “The Softer Side of IT”

Author: Bob Geromette | Network Administrator From my perspective, there are two major categories of skills involved with Desktop Support; Technical skills and the often-overlooked set of “Soft Skills” that are helpful in the role.  There is something extremely gratifying about helping people and resolving their issues. There is also satisfaction in solving the daily […]

The What, Why, and How of Cloud Security

Author: Andrew Whitt | Cloud Security Expert There has obviously been a shift over the last several years to transition from physical data centers, locally based applications, onsite work, and tools that need to be physically plugged in somewhere to cloud hosted data, applications, remotely delivered workforce and Software as a Service (SaaS). Assuming you […]

(Almost) Everything You Ever Wanted to Know About UCaaS but Were Afraid to Ask

Author: Bobbie Sauter Are you perplexed by the ever-changing quagmire of acronyms for the many cloud-based communication technologies out there? In our increasingly mobile world, communication must be effective, global, and available through multiple technologies effortlessly. That’s where UCaaS or “Unified Communications as a Service” comes in.   That’s a lot to unpack for an opening paragraph, but let’s dive in.  You are most likely familiar with SaaS (Software as a Service) such as Salesforce, Office 365, and the like. UCaaS is essentially the cloud-based communications version of […]

Technology in a Changing World

Author: Charles Holsey | Senior Business Analyst In today’s business landscape, every organization functions as a software/technology company. Years ago, if you said you worked for a software company, that literally meant your company sold software and you therefore identified as a “software nerd”. Fast forward to today, where software and technology are everywhere. Adoption, integration, […]

Robocalls – The Good & the Bad

Author: Nayana Reddy | Network Telephony Engineer Have you received a call today where someone is trying to sell you an extended car warranty on your 10- year-old car or an agency trying to give you a last courtesy call on your deferred student loan payment/tax payment that you never owed, or any calls that […]

Using Empathy to Drive Business Intelligence

Author: Afraa Jasim | Business Analyst Data conscious companies are becoming more common in today’s ever changing world. Data integrity, Data Warehouse, and Data Governance all work towards gathering, cleansing, and modeling data for use. Business Intelligence (BI) comes into play after the data has been gathered and organized. BI is the art of extracting […]

VoIP Communications Services – A Cloud Above the Rest

Author: Dino Dziljaj | Manager, Activations Engineering As business leaders navigate through the COVID-19 pandemic, they are learning a variety of new processes, systems and approaches to keep their businesses as normal and stable as possible. This ranges from managing and supporting employees working remotely to the bandwidth and security of their infrastructure. For some, […]

How Data Stewardship and Data Governance Fit Together

Author: Amit Bhatnagar | Senior Solutions Architect Companies are getting serious about managing the availability, usability, integrity, and security of the data in their enterprise systems, including improving data quality, understanding the meaning of the data, and leveraging the data for competitive advantage. Managing data requires accountability. The formal need for business units to take […]

When Scanning Just Isn’t Enough: Why All Businesses Need a Full-Scope Pen Test

Author: Evan Branstner | Security Engineer Many companies confuse the important but separate roles that vulnerability scanning and penetration testing play in their security posture. Some companies, especially in the PCI compliance world, rely too heavily on automated scanning. However, vuln scanning is still a requirement for anyone as even the best pen test will […]