Ransomware Attack: Goldeneye

In the wake of another ransomware attack, this one labeled Goldeneye, we’re reaching out to ensure our partners that we’re focused on security first. According to Forbes, there are similarities with WannaCryptor, but experts are labeling this a varia...

Read More »

Next-Gen Data Security

To understand what next generation security means for the future, we need to know more about what it means today. Let’s start with the basics. What are we trying to secure? Today, data dominates our personal lives, finances, and—with the adoption ...

Read More »

Content Control = Security + Productivity

This blog post was contributed by a guest author from Bitdefender. As a technology solution provider (TSP) you’ve got a big job. Not only are you responsible for machines and systems, but for an even bigger variable – the customers that use them. Wh...

Read More »

Understanding Cyberattacks from WannaCrypt

Understanding Cyberattacks from WannaCrypt

Cyberattacks are growing more sophisticated, and more common, with every passing day. They present a continuous risk to the security of necessary data, and create an added layer of complication for technology solution providers and in-house IT depart...

Read More »

Cyber-Threat Trends to Watch for in 2017

Cyber Threat Trends to Watch

Faced with the volume and rapid evolution of cyber threats these days, technology solution providers (TSPs) may find offering cybersecurity to be a daunting task. But with the right knowledge to inform your security decisions, and the right solutions...

Read More »

Improved Security for Cloud Applications

In the wake of larger companies having fallen prey to hackers, leaving customers vulnerable to ransomware or malicious scams, we’ve received many questions about web applications and security. Our development and cloud ops teams have put a lot of eff...

Read More »