The Key Point Blog

11/14/2023
Anne Valaitis & Jamie Bsales

Stay ahead of the fastest-growing concern in cybersecurity

In this series, in conjunction with Agile Cybersecurity Solutions (our cybersecurity testing and consulting partner), Keypoint Intelligence investigates the use of artificial intelligence (AI) and machine learning techniques in hacking cybersecurity. We discuss here the key tactics of AI hacking and how to overcome it.
11/13/2023
Carl Schell

Once again, Dave Moorman brings the salt and pepper to our Interview Insights series

Simplicity and convenience form a not-so-insignificant chunk of the benefits of what Novatech has been marketing as “The Managed Office” for several years now.
11/10/2023
Lee Davis

It’s like Shark Tank, but for systems integrators working with MSPs

PitchIT is an accelerator program run by ConnectWise to incubate startup systems integrator businesses that are dedicated to the managed services provider (MSP) space.
11/07/2023
Anne Valaitis & Jamie Bsales

A New Challenge for Cybersecurity

In this series, in conjunction with Agile Cybersecurity Solutions (our cybersecurity testing and consulting partner), Keypoint Intelligence investigates the many facets of cybersecurity to deliver insight and strategy. We discuss here some of the key uses of AI as malware and provide some insight into how to combat them.
11/01/2023
Jamie Bsales

Updated model for cyber best practices to debut in early 2024

The US Department of Commerce’s National Institute of Standards and Technology (NIST) has recently announced an upcoming update to its Framework for Improving Critical Infrastructure Cybersecurity (CSF). We discuss here the potential changes and implications thy can have for cybersecurity initiatives.
10/31/2023
Anne Valaitis & Jamie Bsales

The horrors of poor management and IoT attacks

In conjunction with ACS (our cybersecurity testing and consulting partner), we discuss here the dangers of inadequate endpoint and IoT management, which can leave organizations vulnerable to all sorts of cyberattacks. Endpoint detection and response (EDR) solutions are a cybersecurity technology that continually monitors and analyzes endpoint data to detect and respond to anomalous and potentially malicious activity.
10/25/2023
Keypoint Intelligence

A recap of Ricoh’s first large-scale event in four years!

The Ricoh Summit, held in Denver, CO, from October 10-13, brought together the Ricoh team, Ricoh dealers, industry leaders, and exhibitors ranging from software, services, as well as customer relationship management (CRM) and sales enablement providers, all with focused offerings for the channel.
10/23/2023
Rachel Dean

A turnkey IT security subscription service designed to safeguard SMB security

In what was great timing for October’s Cybersecurity Awareness Month, Sharp Europe recently held an analyst event where the company announced a focus on helping SMBs improve their security.
10/19/2023
Keypoint Intelligence

COVID popularized them, but will this take them out?

QR codes have become a critical link between print and digital communications, enabling marketers to direct consumers to websites to further personalize, direct, and track their customer experience. We discuss here the recent QR patent lawsuits brought on by Symbology Innovations and the effect they can have on the market.
10/10/2023
Anne Valaitis & Jamie Bsales
In this series, in conjunction with ACS, Keypoint Intelligence investigates the many facets of cybersecurity to deliver insight and strategy. We discuss here the basics of a cybersecurity incident response plan, which is a comprehensive strategy that outlines the steps an organization will take to effectively detect, respond to, and recover from cyber incidents.