Inside ASCII Featured Articles
-
Lockdown Lessons - Lesson 3: How To Build A Cyber Resilient Business
4/22/2021
Effective cyber resilience starts with people and is bolstered by technology. A layered approach of user education and cybersecurity solutions is the strongest way to secure your business and customers. This section describes the framework for achieving cyber resilience and explains how people and technologies work together to protect businesses from end to end.
-
Lockdown Lessons - Lesson 2: Cyber Resilience is Vital in a Remote Work World
4/22/2021
The massive shift to remote work leaves work-from-home employees vulnerable to data breaches, ransomware and other internet-enabled attacks. Business leaders must prepare for the unique challenges of supporting virtual employees. This section explores the biggest threats to remote workers and explains how to keep remote workforces secure.
-
Lockdown Lessons - Lesson 1: Shifting From Cybersecurity To Cyber Resilience
4/22/2021
Despite efforts by organizations to layer up their cyber defenses, attackers are innovating and automating in new and unpredictable ways, forcing business leaders to shift focus from prevention to response and recovery.
-
10 Reasons MSPs Should Add Security Awareness Training To Their Offering
2/2/2021
Cybersecurity breaches are expensive. Even if you provide industry-leading cybersecurity services, modern malware tactics are too sophisticated to guarantee 100% that your clients will stay safe. A single breach at a client site can spell countless man-hours lost to remediation and disaster recovery—not to mention the damage it does to the trust your clients place in you and your services.
-
16 Questions To Ask Clients In A Vulnerability Assessment
2/2/2021
To create a security plan that actually works, MSPs need to start by assessing their clients’ risk.
-
Hacker Personas: The Infiltrator
1/27/2021
Infiltrators rely on virtual back doors and unprotected points of entry to slip through hidden cracks. Hiding in the shadows, this type of cybercriminal lurks, watches and waits for the opportunity to invade systems. DNS (Domain Name System), which is considered a trusted protocol, is especially vulnerable. Once the criminal redirects internet traffic to malicious websites or takes control of servers, the damage is inevitable. But thanks to modern technology and security awareness training, damage can be mitigated quickly.
-
Hacker Personas: The Opportunist
12/28/2020
While some cybercriminals specialize in targeting large enterprises or governments, opportunists will target anyone – whenever the opportunity arises! This means every business is at risk of attack, and business leaders need to ensure that every employee is properly protected, both from a technology standpoint and through continued security awareness training.
-
Hacker Personas: The Impersonator
12/1/2020
Many users are growing more educated about their attacks, but impersonators are increasingly sophisticated, often hosting malicious content on legitimate sites. Impersonators leverage trusted brand names, and those who let their guard down can easily fall prey.
-
5 Things To Look For When Selecting A Workforce Management Partner
10/22/2020
While there are likely workforce management (WFM) processes in place at your contact center, many contact centers are continuing to rely on spreadsheets to manage staffing requirements. Making changes to any operation takes time, however, implementing a WFM solution has many short-and long-term benefits that can greatly improve the productivity and efficiency of your contact center.
-
How VARs Can Help Clients Safely Reopen
8/6/2020
Michael Russo, Chief Technology Officer at Shift4, has over 30 years of experience in the hospitality and healthcare technology space, building cutting-edge software products, leading agile teams, driving strategic business initiatives, and developing go-to-market strategies. Russo took the time to speak with VAR Insights about how to help merchants struggling to reopen, new payment methods, and what emerging technologies VARs need to be aware of.