Parts of the U.S. are beginning to ease restrictions on social distancing as there are signs that the coronavirus is slowing, but that doesn’t mean things will ever go back to the way they were. Time will tell what the world looks like, but we are certain of one thing: remote work is here to […]
Popular Tags within: Network SecurityCybersecurity Zoom Hybrid Work Remote Work Microphones Cisco UCC Webex Crestron data
Amazon Web Services and Red Hat are expanding their working relationship with the release of Amazon Red Hat OpenShift. The new jointly-managed and supported enterprise Kubernetes service on AWS — set to launch later this year — will provide a self-service experience for cluster creation and operations, deeper integrations with AWS services, on-demand billing, a […]
What types of cyberattacks were carried out this week, May 18, 2020? Read on to find out about the latest cyberattacks and who got hacked this week.
Zoom’s usage has exploded since the coronavirus pandemic forced workers across the world to work remotely, and the platform has largely held up to accommodate that large increase in traffic. That’s why it was a bit of a surprise as the service went down for a significant length of time Sunday, affecting churches and other […]
Oklahoma City University held a virtual commencement recently that was hijacked by “Zoombombs” that let hackers disrupt the event with racial slurs and a swastika. The online event was intended to give the school’s approximately 650 graduates some semblance of the pomp and circumstance they missed because the in-person commencement ceremony was cancelled due to […]
Let’s face it: news and information in the age of the coronavirus is coming quickly. Every day, there are more numbers, stats, data, allegations and controversies centering around the pandemic from countless sources. In these times, business leaders should rely only on qualified and trusted sources to help them make informed decisions about the future […]
Hackers are continuing to take advantage of the coronavirus pandemic and find new ways to steal our information and compromise organizational networks. According to Check Point Research, cybercriminals are meeting end users where they are, and these days that is on videoconferencing and collaboration platforms like Zoom, Microsoft Teams, Slack and Google Meet. Hackers are […]
Internet of Things (IoT) security is a top concern among any tech decision-maker tasked with choosing a platform to solve any need. While most tech managers believe IoT will become the new standard, there are a number of risks to consider when choosing secure IoT platforms. The most detrimental issue with many IoT devices is […]
What types of cyberattacks were carried out this week, May 11, 2020? Read on to find out about the latest cyberattacks and who got hacked this week.
Today is World Password Day, and it’s a great reminder that we should always strive to promote better password management. According to National Day Calendar, security researcher Mark Burnett first encouraged people to have a “password day,” where they update important passwords in his 2005 book Perfect Passwords. Inspired by his idea, Intel Security took the […]