6 most-dreaded IT projects
The projects that most IT professionals dread are the thankless yet essential tasks that garner little acknowledgment or respect. Patch management isn't glamorous, but fail to keep up and your…
ActivEdge Technologies – Old Site
The projects that most IT professionals dread are the thankless yet essential tasks that garner little acknowledgment or respect. Patch management isn't glamorous, but fail to keep up and your…
As organizations explore emerging threat trends, new research emphasizes the growing impact of mobile phishing on enterprise security. Since 2011, Lookout Research has observed an 85 percent year-over-year increase in…
let's be honest, employees make mistakes. And sometimes those mistakes have catastrophic consequences. Everybody has heard stories about people accidentally leaving an unencrypted work laptop on the train, or on…
We would all like to think that we could never be fooled by a email scammer, but these cybercriminals are as sophisticated as they’ve ever been, and their scams compromise…
While much of what happens in a modern business depends on how data moves back and forth across the corporate network, concern about network security has risen by 71 percent…
Identity management-as-a-service (IDaaS) helps solve many of the challenges related to identity and access across today’s hybrid enterprise. Organizations looking to embrace the cloud can benefit immensely from IDaaS solutions, which…
So you've decided to take one of the latest certification exams. Passing this one may just add to the alphabet soup of certifications that are already attached to your…
A recent study found that a quarter of employees reuse the same password for all their accounts, putting corporate cybersecurity at risk and highlighting a need for better training. Even…
Soccer is a multi-billion dollar industry followed by billions of people around the world, so it’s not surprising at all that it isn’t immune to the tech sector’s favourite buzzword…
[et_pb_section][et_pb_row][et_pb_column type="4_4"][et_pb_text]Week over week, a new threat against valuable data emerges. Sometimes, adversaries in cybersecurity find ways to infiltrate systems through advanced malware strains. Other times, they’ll find holes in…