IT security

We have searched the depths of our blog to provide you with the latest IT articles on Security. Get Connected Today!

The Power of Three: Secure Office 365 with Cisco Solutions

We all have watched superhero movies. There’s always a villain, a threat, and the superhero at the end who saves the day. In our case, we have three superheroes called…

Share on LinkedInTweet about this on TwitterShare on Facebook
Read More

Insights from the PewDiePie Hack: Trends in Strengthening Public Sector Printer Security

Nowhere is cyber security more important than the public sector. Federal employees and public sector agencies are responsible for setting the standards for responsible information handling. As a result, it’s…

Share on LinkedInTweet about this on TwitterShare on Facebook
Read More

Build a Layered Security Solution

Modern cyber attacks are increasing and are becoming more sophisticated. In addition to existing malware, security experts are seeing an increase in never-seen-before malware. For the average SonicWall customer, malware…

Share on LinkedInTweet about this on TwitterShare on Facebook
Read More

Are Printers Your Security Weak Spot?

Does your organization have networked printers? If the answer is yes, they may be one of your organization’s most critical—and most overlooked—cyber security weak spots. The Ponemon Institute is one…

Share on LinkedInTweet about this on TwitterShare on Facebook
Read More

Understanding the Internet of Things and Security Threats You Never Knew Existed

It’s the dawn of a new era for a set of networking protocols known as universal plug and play (UPnN) and Internet of Things plug and play. The Internet of…

Share on LinkedInTweet about this on TwitterShare on Facebook
Read More

© 2017 Connection, Inc. All rights reserved.