On Monday October 16th, 2017, researchers disclosed major weaknesses in WPA2. This link is a full website that has both layman’s details and technical details regarding the vulnerability. US ProTech has learned that “Krack” has been known by key industry players since June of 2017 despite having just been disclosed to the public this week.
The internet of Things (IoT) is much-talked-about technology. Driven by low-cost sensors, ubiquitous connectivity and updates to the Internet Protocol (IP), IoT is rapidly being adopted. Research firm Gartner expects over 8 billion devices connected in 2017. Cities use IoT to relieve parking congestion by collecting data on open parking spots; farmers can measure moisture in soil; and manufacturers use this technology to track inventory in their supply chain. Because these devices may use machine-to-machine connectivity without human intervention, this can increase the IoT Security Challenge. Here are some security considerations for IoT.
Recent Hurricanes Harvey and Irma, along with major earthquakes in Mexico, remind us how vulnerable we can be to disasters, and underscore the importance of data protection. As businesses depend on access to a range of systems–including call center, communications and collaboration application, customer management, and more–having a solid data protection plan can help you in a disaster recovery scenario. Now more than ever, a range of options exist to help maintain business continuity. Here are a few options to consider.
According to a recent research report “Assessing the Cloud Security Landscape” by the Computing Technology Industry Association (CompTIA), 85% of business owners and IT professionals participating in a survey responded that they are Confident in their Cloud Service Provider. No wonder research firm IDC predicts the market for public and private cloud security to more than double over the next few years. What Cloud Security Concerns are top of mind with business owners, and what can you do to reduce your risk? Read more to find out…
Your network is the backbone of your IT Infrastructure. Your network health is also an integral part of your defense against Cyber threat. Cloud Computing, Communications and Collaboration, Data Protection, and Digital Transformation put more reliance on your network. This begs the question, how is your network health? Ask yourself these three questions to find out the answer…
Reputation Management is a hot topic in the boardroom these days. Having a solid business continuity plan could make or break your company’s ability to survive a data breach or other systems failure that could tarnish your hard-earned reputation. Company news about data loss, systems downtime and other unplanned interruptions occur with regularity. According to technology research firm Gartner, a business that has a catastrophic data event has a two-year survival rate of just 6%. Surprisingly, your company can avoid these scenarios by having a solid BC/DR Plan.
Cloud Computing adoption continues to outpace the growth rate of total IT spending. According to research firm Gartner, the market for public cloud services will continue expanding, with year-over-year revenue growth of 17.3%. Compare this to Gartner Growth expectation of total IT Growth of 1.4% and you can see how the market for Cloud Computing is maturing. Cloud Service Providers offer a wide range of solutions.
Many businesses turn to technology to find ways to reduce costs and overhead. Technology trends–Software as a Service, Internet of Things, SD-WAN
With Cyber Threats on the rise, the importance of maintaining network compliance is top of mind with business owners and IT professionals alike.
Most companies rely on Cloud Computing for their business. Popular Software as a Service (SaaS) applications including Voice over IP (VoIP), Hosted Email, Sales Force Automation (SFA), and Customer Relationship Management (CRM) can all be rapidly deployed by a technology Advisor.