What is NIST Compliance? The NIST Cybersecurity Framework Explained

What is NIST Compliance? The NIST Cybersecurity Framework Explained

New cybersecurity requirements for government agencies and contractors, special publications for agencies, contractors/ sub-contractors, and everyone else in between. It's a lot of information. Here we take a moment to explain it all.

If you know what the NIST Cybersecurity Framework is, or have at least heard the terms popping up, chances are it affects your organization.

SMBs survive disasters with virtualization

SMBs survive disasters with virtualization

Hurricanes Harvey and Irma caused millions of dollars in damages. Some of that damage was unavoidable, but hundreds of businesses managed to stay open thanks to innovative virtualization solutions. If you’re not already taking advantage of this technology, it’s time to find out what you’re missing.

Reduce your printing costs with these 5 tips

Reduce your printing costs with these 5 tips

Outdated printers, the lack of a printing workflow, and an over-reliance on hard copies may be contributing to your ballooning printing expenditures. With some creative problem-solving and fresh ideas, you could drastically reduce your printing budget.

VoIP Phishing: This is How Scammers do it

VoIP Phishing: This is How Scammers do it

Although many companies still use traditional phones, an increasing number rely on VoIP’s (Voice over Internet Protocol) multi-functionality, which allows employees to make voice calls, conduct video-conferences, and chat. Although many scammers send fraudulent emails to extort money or steal data from businesses, new ‘vishing’ campaigns are proving to be a more efficient way to scam.

Common Misconceptions About Cyber Liability

Common Misconceptions About Cyber Liability

We've partnered with The Armstrong Company to feature a blog series on cyber liability and how it can affect you. Keep reading for some of the most common misconceptions about cyber liability, according to the experts!

Cyber liability coverage (for data breaches) has evolved from just insurance for information technology companies to coverage that nearly every kind of business should have - if they don't already.

The History of Hacking: Are all hackers out to do harm?

The History of Hacking: Are all hackers out to do harm?

The days of  home-organized hacking led by thrill-seeking teenagers are gone. Learn how hackers are changing the world.
Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple.