The Key Point Blog

04/30/2020

Jamie Bsales

On-Premises Servers, Devices, and Data Are Useless When No One Is There

Businesses are still far too reliant on the traditional on-premises architecture. While many companies have migrated some functions to the cloud, the COVID-19 pandemic saw plenty of IT folks scrambling to set up VPNs to allow remote access to critical applications and files that reside on-site.

Read

04/01/2020

Carl Schell

Mega Dealer Exec Discusses Making an Impact in Managed IT Services

With over 20 years of IT experience, Layton has seen it all. He started with Novell to Windows NT upgrades and segued into the dot-com bubble, after which he entered the consulting space.

Read

03/26/2020

Jamie Bsales & David Sweetnam

Your Home Printer and Network Equipment Could Be Putting Corporate Data at Risk

Recent legislation measures introduced by governments across the globe have forced businesses to take much more seriously the safeguarding of our personal data, with the threat of serious punitive fines for those who breach the rules.

Read

02/20/2020

Jamie Bsales

Testing Security from Three Vectors

There’s been no shortage of conversation around MFP and printer device security, with competing claims—and sometimes outright sniping—among major OEMs about who has which features and whose devices are more vulnerable to hackers.

Read

01/08/2020

Carl Schell

Company Founder Discusses BTA and TAG Memberships, Managed IT

Cornerstone Technologies is one of seven office equipment dealers that took the plunge in 2019 and became a TAG member, on top of already being a member of the Business Technology Association.

Read

01/02/2020

Keypoint Intelligence

Are You Touched by CCPA?

You might be surprised at how much data is flowing through your company. Accounting data, bank accounts, EDI accounts, names and addresses are all data. In the eyes of the State of California that data is now subject to the California Consumer Privacy Act  (CCPA) and it poses some challenges companies doing business in California, but also companies who do business with constituents in California.

Read

11/19/2019

Carl Schell

On the Verge of 2020, TAG Helps Members Prepare for Further Growth

Though the sessions on security and the cloud carried the most weight, no surprise as they’re two of the biggest topics today in not only the IT space but the imaging sector too, the rest of the program was equally informative.

Read

06/18/2019

George Mikolay

Security, Production, and uniFLOW Also Highlighted at Atlanta Event

“The smaller, more intimate setting of our regionalized dealer events allows for more access to individuals that don’t typically come to a larger national dealer event, such as sales reps and service technicians,” said Canon U.S.A., Inc.’s Hiroyuki “Hiro” Imamura.

Read

01/07/2019

Colin McMahon

When stories of cyberattacks reach the media, the culprit is often an outside source. Whether it is a foreign government or malicious hacker, organizations are conditioned to seek external threats to data security. This approach, however, misses a common cause of cyberattacks and data breaches—a company’s own employees.

Read

11/20/2018

Colin McMahon

Stories about data breaches leaking personal data and damaging company profitability continue to make headlines. Much of the focus in these pieces includes the sophisticated forms of cyberattacks that are involved. For example, the WannaCry attack of 2017 was accomplished with a ransomware worm while the infamous Equifax breach reportedly came from software exploitation.

Read