Select Topics

  • Cybersecurity
  • Security
  • Uncategorized

Latest Blog Post

Cybersecurity

An EPO Health Check Is Key Step In Protecting Your It Environment

Most everyone understands that an annual physical checkup is the best way to stay fit and guard against potentially harmful illnesses. Or that taking your car in for periodic tune ups is the most effective way to ensure your vehicle…

By Deb Gannaway on November 16, 2019 7:45 am

Cybersecurity

Staying Secure in Virtualized Offices: A Checklist to Evaluate Your Remote Work Security

Do you have concerns about your remote work security? Now that the sudden and unexpected shift to working in virtualized offices is behind us and employees are settling into the new normal of working from home, it’s time to evaluate…

By Deb Gannaway on August 6, 2020 8:36 pm

Security

An EPO Health Check Is Key Step In Protecting Your It Environment

Most everyone understands that an annual physical checkup is the best way to stay fit and guard against potentially harmful illnesses. Or that taking your car in for periodic tune ups is the most effective way to ensure your vehicle…

By Deb Gannaway on November 16, 2019 7:45 am

Security

Staying Secure in Virtualized Offices: A Checklist to Evaluate Your Remote Work Security

Do you have concerns about your remote work security? Now that the sudden and unexpected shift to working in virtualized offices is behind us and employees are settling into the new normal of working from home, it’s time to evaluate…

By Deb Gannaway on August 6, 2020 8:36 pm

Security

Incorporating Threat Protection For Your Mainframes

Most organizations have been vigilant about implementing security applications and procedures for their cloud-based endpoints and other components of their distributed networks. But what about the trusted, traditional mainframes that may make up much of your IT infrastructure? In many…

By Deb Gannaway on November 16, 2019 7:15 am

Security

5 Reasons To Reevaluate Your Endpoint Security Plan

An out-of-the-box anti-virus solution no longer works for enterprise security. Employees are working outside of firewalls with multiple, connected devices that rely on web applications to deliver operational efficiency. Even when devices work inside the firewall, vulnerabilities exist that may…

By Deb Gannaway on November 16, 2019 7:43 am

Security

3 KEY FOCUS AREAS FOR EFFECTIVE MALWARE DEFENSE

Malware threats continue to be a major source of concern for business leaders. According to a report from Nationwide, nearly 60 percent of small businesses have been victims of a cyberattack over the past year. Even more startling, most weren’t…

By Deb Gannaway on November 16, 2019 7:24 am

Security

4 WAYS DATA PROTECTION CAN INCREASE YOUR COMPETITIVE ADVANTAGE

Increased breaches and growing threats have put data protection at the top of the list of IT leaders’ issues list. Governments around the world are joining the fray by mandating data security safeguards for businesses. One of the most prominent…

By Deb Gannaway on November 16, 2019 7:27 am

Security

INCREASE SECURITY, LOCK DOWN USER PRIVILEGES

There is incredible value in taking a ‘back to basics’ approach to endpoint security. Focusing efforts on the fundamental aspects of security helps create a rock-solid, network foundation without the costs associated with procuring new hardware or software. In the…

By Deb Gannaway on November 16, 2019 7:29 am

Security

THE IMPORTANCE OF DATA BACKUP AND RECOVERY IN ANY SECURITY STRATEGY

It cannot be overstated: a “back to basics” approach to system security can reduce the number of administrative tasks and improve the overall security of an organization’s network. Those in charge of managing the day-to-day IT operations or C-level strategy…

By Deb Gannaway on November 16, 2019 7:36 am

Security

WHY YOU NEED A BACK TO BASICS APPROACH FOR NETWORK SECURITY

With the abundance of cybersecurity threats and vulnerabilities today, it can be tempting to see purchasing the latest security appliances and software as the light at the end of the tunnel. But even the most advanced network security system cannot…

By Deb Gannaway on November 16, 2019 7:39 am

Security

INFOGRAPHIC: THREE ESSENTIAL PILLARS OF A SECURITY PROGRAM

Today’s cybersecurity threat landscape is constantly changing. With IT budgets stretched to the limit and new threats emerging every day, it's essential for organizations to ground their technology use with security best practices. DG Technology recommends implementing a "back-to-basics" cybersecurity…

By Deb Gannaway on November 16, 2019 7:40 am

Security

5 BEST PRACTICES TO GUARD AGAINST WANNACRY AND PETYA THREATS

On May 12, 2017, the powerful WannaCry ransomware infected more than 300,000 computers in over 150 countries in less than 24 hours. Six weeks after the WannaCry attack, a variant of the ransomware called Petya arrived on the scene and…

By Deb Gannaway on November 16, 2019 7:20 am