21 02, 2018

Why Businesses Are Putting Their Call Centers in the Cloud

By | 2018-02-21T07:31:53+00:00 February 21st, 2018|Categories: Industry Blog|Comments Off on Why Businesses Are Putting Their Call Centers in the Cloud

Companies today must work harder than ever to keep their customers. Today’s customers have high expectations and a range of alternative choices. They want to communicate in a way that is comfortable and natural to them—whether it be email, chat or even SMS. And they expect a flawless experience every time. Should they feel dissatisfied, experience [...]

20 02, 2018

Is the Cloud Ready for Your Desktop?

By | 2018-02-20T09:14:08+00:00 February 20th, 2018|Categories: Industry Blog|Comments Off on Is the Cloud Ready for Your Desktop?

IT teams today are saddled with a lot of responsibility, from keeping things running to modernizing and innovating. Many of our clients tell us they’re continually looking at ways to reduce time and money spent on management and operational tasks, and increase focus on more strategic initiatives. In the realm of desktop management, virtualization has opened [...]

8 02, 2018

The End of Servers

By | 2018-02-08T18:18:34+00:00 February 8th, 2018|Categories: Industry Blog|Comments Off on The End of Servers

By now, there’s a good chance you’ve grown comfortable with the idea of cloud computing, even if you still maintain an on-premise datacenter. The cloud has become ubiquitous, and headlines remind us every day about the mass adoption rates seen across many industries. You’re also probably warming up to the idea of Infrastructure-as-a-Service (IaaS), where your [...]

31 01, 2018

Containers: A Primer

By | 2018-01-31T08:01:41+00:00 January 31st, 2018|Categories: Industry Blog|Comments Off on Containers: A Primer

You’ve probably noticed that software runs differently in different computing environments and within different networks. It doesn’t matter if it’s the same software version; simply moving it around to various environments and platforms can cause a myriad of funky issues to arise. For example, you may be testing software on, say, Bob’s laptop. But when Bob [...]

26 01, 2018

Zero Trust Security – Part 2 – War on Two Fronts

By | 2018-01-23T09:45:16+00:00 January 26th, 2018|Categories: Industry Blog|Comments Off on Zero Trust Security – Part 2 – War on Two Fronts

This is the second part in a two-part series about taking a Zero Trust approach to security. Read the first part here. Organizations that want to avoid becoming the next Office of Personnel Management (or Yahoo, or Uber, or Equifax, or Sony) and prevent the exfiltration of their critical and sensitive data should address security as [...]

23 01, 2018

Zero Trust Security – Part 1 – Trust No One

By | 2018-01-23T09:52:57+00:00 January 23rd, 2018|Categories: Industry Blog|Comments Off on Zero Trust Security – Part 1 – Trust No One

This is the first part in a two-part series on taking a Zero Trust approach to security. Can you remember what you were doing ten years ago today? Thanks to one of my favorite Internet tools, tenyearsago.io, I know that 10 years ago ESPN was discussing a long-shot deal to get Alex Rodriguez on the Yankees. [...]

16 01, 2018

Everything You Need to Know About Spectre & Meltdown

By | 2018-01-16T16:58:44+00:00 January 16th, 2018|Categories: Industry Blog, Industry Updates|Comments Off on Everything You Need to Know About Spectre & Meltdown

Last week, security researchers revealed two major software vulnerabilities that, in one way or another, affect just about anything with a processor. The flaws, called "Spectre" and "Meltdown," can potentially allow hackers to steal encrypted passwords as you type them in. If Spectre has you spooked, read on to learn more about these vulnerabilities and what’s being [...]

20 11, 2017

Cisco Acquired BroadSoft. Here’s What It Means for You.

By | 2017-11-21T09:18:14+00:00 November 20th, 2017|Categories: Industry Blog, Industry Updates|Comments Off on Cisco Acquired BroadSoft. Here’s What It Means for You.

If you haven’t seen the news about Cisco acquiring BroadSoft, take note. The acquisition signals a strategic move on Cisco’s part to transition its telephony offerings to the “as-a-Service model. Here’s how this may impact you as you evolve your organization’s communications strategy, and what this means for the market overall. First, some background: we all [...]

2 11, 2017

What is WannaCry and What Can I Do About It?

By | 2017-11-06T17:16:16+00:00 November 2nd, 2017|Categories: Industry Blog|Comments Off on What is WannaCry and What Can I Do About It?

We recently discussed ransomware, and why you need to prepare for it. WannaCry is perhaps the most notorious and prolific of recent ransomware-style attacks. It’s stopped businesses, small and large, in their tracks, holding their data hostage and demanding thousands or tens of thousands of dollars in Bitcoin, with no assurance that data would actually be [...]

10 10, 2017

Ransomware is on the Rise. Are you Prepared?

By | 2017-11-21T09:41:46+00:00 October 10th, 2017|Categories: Industry Blog|Comments Off on Ransomware is on the Rise. Are you Prepared?

Ransomware continues to be the attack method of choice against businesses around the globe. We are seeing an increase in attacks, with hackers demanding more money, and attacks becoming more sophisticated. These data breaches, in parallel with compliance requirements, can be devastating to a company across numerous fronts. Targets include companies of all sizes, across all [...]