Make sure you understand the top risks and follow best practices
Information security is a top priority in many companies, reinforced by the COVID-19 crisis and expansion of work into home environments. This infographic blog presents key data from a recent Keypoint Intelligence report.Industry veteran discusses his vision for product testing and market research organization
Anthony Sci is a New Yorker, plain and simple. He’s direct, highly educated, and, perhaps more than anything else, passionate. These traits—and many more, rest assured—will no doubt serve him well as he heads up Keypoint Intelligence, which in 2021 is celebrating its 60th anniversary.For OE dealers, partnering is a great way to launch a cybersecurity practice
In an increasingly digital world, businesses need to be able to protect themselves from becoming the next cybercrime victim, and customers are increasingly interested in their cyber safety.Product suite combines secure PCs and printers with an “expansive set” of software and services
The thinking behind HP Wolf Security is to integrate an array of HP’s class-leading security technologies and offerings to relieve some of the burden currently falling on customers’ IT personnel.Directions in managed IT and the cloud
Fact: The pandemic has had a dramatic, everlasting effect on the cloud and the remote workforce. For IT vendors, MSPs, and, yes, those office equipment dealers that have an IT practice, there has been no downtime in developing as well as selling products and services to help customers thrive during the pandemic.New data indicates attacks by state-sponsored hackers have doubled in the last three years
We all know that cybercrime has been a growing issue, and research released by HP shows just how bad the situation has become. In conjunction with the results of this study, HP also released its latest, downloadable Quarterly Threat Insights Report, which highlights new techniques being used by cybercriminals to breach vulnerable endpoints such as servers, computers, MFPs/printers, and IoT devices.Understanding the security threat printers pose and recommendations on how to mitigate vulnerabilities
Followers have heard us mention time and again the security threats that Internet-connected printers and MFPs can pose to a home or corporate network. This blog explores some of the solutions Keypoint Intelligence has found to combat these threats.This week’s theme: “The Future of Connected Devices”
In the fifth and final blog of our NCSAM series, we explore the future of cybersecurity through expert opinion and outside studies.This week’s theme: “Securing Internet-Connected Devices in Healthcare”
The theme for this week's cybersecurity blog is specific to securing devices in healthcare. We explore common vulnerabilities and opportunities for protective measures.This week’s theme: “Securing Devices at Home and Work”
Any cybersecurity professional will tell you there is no way to be 100% secure, but there is a short list of things that you can do to hedge your chances of mitigating a risk. This week's NCSAM blog explores the ways to be as safe as possible.