General Computing Executive Commentary

  1. Email Is A Major Security Risk For Small Business
    8/24/2016

    Hackers and small businesses share one thing: they rely on email. Todays’ cybercriminals are organized and business-minded. They make investments and they expect returns. Some invest in big targets, such as Home Depot and Anthem. Others invest in massive attacks, such as ransomware and botnets.

  2. 3 Tips For How Channel Partners Can Flourish In The Cloud
    8/23/2016

    These days, making inroads in the cloud is imperative for all channel firms. With the Software as a Service (SaaS) market projected to exceed $112.8 billion by 2019, channel providers need to strategically adapt in order to remain competitive in a market increasingly dominated by the SaaS model.

  3. Why You Should Lead Your Sales Pitch With Endpoint Security
    8/23/2016

    A common question asked during a job interview is whether or not the employee has an opportunity to work remotely. Not only does it benefit the employee by saving commute time, the employer benefits as there is no additional overhead or potential distraction by other employees in the office. The trend is common and software tools make it easy, but it’s possible there are too many software tools providing such services, thereby raising the level of concern for data security amongst IT professionals.

  4. Fight Social Engineering — Make Your Priceless Data Completely Worthless
    8/22/2016

    When a new wall goes up, criminals will always search for a door in or a way around. It’s in their nature, and it’s ultimately what fuels them. This is the transition we are witnessing in the cybersecurity space today.

  5. The State Of Cloud
    8/19/2016

    Cloud is about a decade old now and has seen vast improvements in stability and reliability, with a steady increase on breadth of offerings from IaaS to PaaS to SaaS. Certainly the lion’s share of cloud was taken up by SaaS, but that has changed recently with a definite movement — driven by developers and engineers — to IaaS and PaaS with a focus on creating new apps using services from public providers like Amazon Web Services. By Deirdre Mahon, CMO, Cloud Cruiser

  6. 3 Steps To Armor Your Computer Against Hackers & Ransomware
    8/18/2016

    Ransomware has become a lucrative business for hackers operating worldwide with the river of money flowing into their coffers fueling a cyber security arms race — good versus criminal — and putting you squarely in the crosshairs.

  7. The Process Bulldog
    8/15/2016

    The Process Bulldog is a lynchpin role at the heart of a healthy process culture. This role is the connection layer of your process governance structure —linking the vision of the leadership team with the creativity of the process owners and participants, the people who are involved in process challenges every day. Every organization needs one.

  8. 5 Simple Security Habits For Your K-12 Education Customers
    8/11/2016

    In the world of cybercrime where hackers are generally one step ahead of everybody else, good security practices can literally be the difference between protecting critical computer data and exposing the personal and confidential information of school staff, students, parents, and third-party contractors.

  9. The Risk Of Dis-Unified Communications
    8/10/2016

    There is little doubt the cloud has come to the forefront of information technology. As such, more and more businesses are adopting the cloud for communications applications. By Scott Kinka, CTO, Evolve IP

  10. 4 Ways Automation Improves Business Productivity
    8/10/2016

    Productivity is something everyone aims to improve upon. Whether you are a business owner, part of the sales team, handle customer service, or manage the organization’s IT infrastructure, there is always room to improve.