• The Rise of Secure Messaging: What It Promises, How It’s Being Used and What It’ll Take To Go Mainstream

    by Natalie Hope McDonald  | April 04, 2017
    People go to great lengths to protect their privately stored data and email accounts but may not give a second thought to their text messages – and hackers have noticed. This is why secure messaging – apps that encrypt texts and phone calls – may be the next wave in cybersecurity. Learn more here.
    Full Story
  • ‘Watch Out For That Nigerian Prince’: CompTIA IT Security Community Meets at AMM

    by Daniel Margolis  | March 21, 2017
    The CompTIA IT Security Community meeting at AMM this year was lively, even considering Star Trek as “a dystopic future where everyone has given up on security.”
    Full Story
  • Are You Ready for the Worst Possible Cybersecurity Attack?

    by Seth Robinson  | February 22, 2017
    Even though megabreaches have raised the level of security awareness, the reality is that we may not have seen the worst of cyberattacks yet and may need an even more dramatic event for companies to revolutionize their security policies.
    Full Story
  • ChannelTrends: Build an IT Security Expertise, Not Just a Portfolio

    by Brian Sherman  | January 25, 2017
    The best way for today’s IT service providers to differentiate themselves and provide greater value to their clients is to become true experts in the areas that matter most, and IT security is the perfect example. Most small businesses have little, if any clue how to properly protect their data and knowledge in this area is invaluable. Channel firms that can identify and mitigate companies’ unique risks will find themselves in a much better position in the future than those who simply offer tools (which businesses can buy virtually anywhere).
    Full Story
  • Health Care Under Siege: How One of The Most At-Risk Industries Can Avoid Cyber-Attacks

    by Natalie Hope McDonald  | January 12, 2017
    IT pros are working with health care companies to guard against cyber-attacks. Find out what you can do now to prevent breaches that can cost companies millions in cleanup and compromised brand image.
    Full Story
  • ChannelTrends: The Top Five Industry Stories of 2016

    by Brian Sherman  | December 22, 2016
    Which stories were of most importance to the channel in 2016? With so many to choose from, we narrowed it down to the five that should have a major impact on the IT industry for years to come.
    Full Story
  • ChannelTrends: Let’s Get Physical

    by Brian Sherman  | November 11, 2016
    What many providers fail to remember is that their customers’ protection concerns often go beyond the network. Ensuring a safe and secure workplace is just as important of a responsibility, and not something they would just hand off to anyone. They look to those they not only trust, but who have the necessary skills to support their physical security systems and strategies. The question many in the channel continue to ask is if these technologies present a viable opportunity for their business. In many cases, the answer is a resounding "YES."
    Full Story
  • ChannelTrends: Scary Considerations for Building a Security Practice

    by Brian Sherman  | October 26, 2016
    With Halloween almost here, what could be scarier than building a cybersecurity practice? Those who go down that road should certainly approach it with eyes wide open. Risk will undoubtedly increase. That’s what happens when you take on such a crucial responsibility for clients; they expect nothing bad will happen to their data or their networks. Those expectations should drive higher margins ̶ but they have to be able to deliver to reap the rewards.
    Full Story
  • ChannelTrends: 6 Best Practices When Building an Advanced Security Practice

    by Brian Sherman  | September 14, 2016
    Despite the growing number of channel firms offering basic data and network protection today, it’s simply not enough just to counter the basic threats today. Security has to move from a line item in the portfolio to a more highly advanced, proactive management service. It’s a true consulting focus that can be best summarized with six industry best practices.
    Full Story
  • Audits, Issues and Opportunities in Security Compliance

    by Brian Sherman  | August 08, 2016
    Many customers don’t know the difference between “complying” with standards and regulations and actually being secure. Those misperceptions have to be addressed early on in the solution conversation to prevent major issues (and significant blame) from occurring later. That was just one of the observations made by panelists in the Common Problems Encountered in Security Compliance session at ChannelCon 2016.
    Full Story
First PagePrevious Page
Next PageLast Page
Page: of 12
  • Who Owns Digital Security in Your Company?

    by Matthew Stern | Oct 31, 2018
    Who is responsible for digital security in today’s cloud-enabled workplace? Once upon a time, IT was the clear answer. Now the answer is a little more complicated – the role of IT in digital security is a matter of both leadership and partnership.
    Full story