The Key Point Blog

10/07/2020
Aaron Hale

This week’s theme: “If You Connect It, Protect It”

For the first week of NCSAM, this blog explores the unknown dangers of smart devices and provides the National Cybersecurity Alliance's "commonsense checklist" of solutions to overcome common weak points.
10/02/2020
Jamie Bsales

Expands successful “bug bounty” program to office-class HP Original Ink and Toner cartridges

HP is expanding its "bug bounty" program to ink and toner cartridges. The company is challenging four professional ethical hackers to identify security vulnerabilities and risks that might be lurking in the firmware found in office-class HP Original Ink and Toner cartridges.
10/01/2020
Aaron Hale

The 2020 theme: “Do Your Part. #BeCyberSmart”

In its 17th year, the CISA National Cybersecurity Awareness Month (NCSAM) continues to raise awareness about the importance of cybersecurity in the US. This blog kicks off our series on the topics covered during this year's NCSAM.
08/27/2020
Aaron Hale

Traditional OEMs and Dealers are Expanding Service Offerings to Remain Competitive

Until recently, security was relegated to protecting multifunctional devices and printers and the output that they produced. This blog explores the other security methods that have developed since then.
08/18/2020
Aaron Hale

The Controversy Surrounding TikTok and WeChat

Technology can help us to grow our businesses, educate our children, increase the speed of gathering information, and facilitating important research, but it also puts our personal information at risk. This blog explores these dangers using TikTok and WeChat as examples.
08/11/2020
Aaron Hale

People Can Be Your Weakest Link or Your Best Defense

Security is a combination of people, processes, and technology. While they work in concert to protect an organization’s intellectual property or sensitive information, the people component has proven to be one of the weakest links in an organization’s security posture.
08/06/2020
Aaron Hale

What Print Service Providers Need to Know in Today’s Regulated Business Environment

Worldwide, legislation is being established to protect people's personally identifiable information. This blog explores the attestations and accreditation that PSPs can pursue to protect themselves.
06/29/2020
Jamie Bsales

Threat Grows as Employees Work from Home for the Foreseeable Future

There is a newly uncovered security vulnerability possibly lurking in hundreds of millions of Internet-capable devices sold over the past 20-some-odd years that includes printers and other IoT devices home-based employees rely on.
04/30/2020
Jamie Bsales

On-Premises Servers, Devices, and Data Are Useless When No One Is There

Businesses are still far too reliant on the traditional on-premises architecture. While many companies have migrated some functions to the cloud, the COVID-19 pandemic saw plenty of IT folks scrambling to set up VPNs to allow remote access to critical applications and files that reside on-site.
04/01/2020
Carl Schell

Mega Dealer Exec Discusses Making an Impact in Managed IT Services

I’ve had the pleasure of working with Impact Networking twice before, both times on articles with company President Dan Meyer. For this third adventure, I wanted to move beyond typical dealer profile material and hardware talk—enter Patrick Layton, Vice President of Managed IT Services at Impact Networking.