Wi-Fi 6E: Don’t let hype push you off your refresh cycle

Wi-Fi 6E: Don’t let hype push you off your refresh cycle

Despite the inarguable advantages of operating Wi-Fi in the 6GHz frequency range, analysts say that the smart time to buy Wi-Fi 6E is whenever an organization would ordinarily make an upgrade – and not before. Wi-Fi 6E is mostly identical to Wi-Fi 6, but the key difference is the 6E standard’s ability to take advantage of the 6GHz spectrum that was made available for unlicensed use by the U.S. last year. It’s a great deal…

Read More

How to build a cyber security incident response team (CSIRT) – IT Governance UK Blog

How to build a cyber security incident response team (CSIRT) – IT Governance UK Blog

Who will you call when your organisation has been compromised? Having a cyber incident response team ready to go can save your organisation from disaster. There’s no escaping the threat of cyber security incidents. Criminals are constantly poised to exploit vulnerabilities, and employees use complex IT systems where mistakes are bound to happen. Investing in cyber defences can reduce those risks, but organisations need to be ready for threats they can’t prevent. A CIR (cyber…

Read More

ISO 27001 vs. ISO 27002: What’s the difference?

ISO 27001 vs. ISO 27002: What’s the difference?

Anyone with an interest in information security will have encountered ISO 27001, the international standard that describes best practice for an ISMS (information security management system). However, you might not be as familiar with ISO 27002. It’s a supplementary standard that provides advice on how to implement the security controls listed in Annex A of ISO 27001. Although ISO 27001 is the more well-known standard – and the one that organisations certify to – neither…

Read More

Cybersecurity: A Cure for a Disheartened Professional

Cybersecurity: A Cure for a Disheartened Professional

Data breaches and ransomware attacks aren’t just still occurring. They’re also becoming more frequent. According to ZDNet, the number of ransomware attacks detected and blocked by one security firm grew 715% year-over-year in 2020 alone. Another security company calculated the total number of ransomware attacks for the year to be around 65,000, wrote NPR. That’s about seven ransomware incidents every hour. As a security professional with more than two decades of experience in the industry,…

Read More

5 Channel Partner Program and MSP News Updates: 22 July 2021 – ChannelE2E

5 Channel Partner Program and MSP News Updates: 22 July 2021 – ChannelE2E

by Joe Panettieri • Jul 22, 2021 Here five (actually, more) technology news updates, insights, chatter, and plenty more to start your day for Thursday, July 22, 2021. Sip up. What’s In Our Daily Brew? Who We Serve: Content for managed services providers (MSPs), IT service providers (ITSPs), technology solutions providers (TSPs), cloud services providers (CSPs), IT consulting firms, systems integrators, VARs, independent software vendors (ISVs), and any other partner acronym that further caffeinates our already…

Read More

Miercom validates deployment simplicity of Cisco’s SASE solution – Cisco Blogs

Miercom validates deployment simplicity of Cisco’s SASE solution – Cisco Blogs

With the digital transformation of businesses, security is moving to the cloud. This is driving a need for converged services to reduce complexity, improve speed and agility, enable multicloud networking and secure the new SD-WAN-enabled architecture. Secure Access Service Edge (SASE) is the convergence of networking and security that is transforming the way organizations are delivering these services from the cloud. One of the key functions in SASE is SD-WAN that enables customers to connect…

Read More

How to activate Microsoft Defender Application Guard in Windows 10

How to activate Microsoft Defender Application Guard in Windows 10

Microsoft Defender Application Guard protects your networks and data from malicious applications running in your web browser, but you must install and activate it first. Image: Mix Tape/Shutterstock In a previous article, we noted that many of the security features listed as absolute requirements for a successful Windows 11 installation are already available as options in Windows 10, you just have to turn them on manually. If you are wondering if your current Windows 10…

Read More

Should we use AI in cybersecurity? Yes, but with caution and human help

Should we use AI in cybersecurity? Yes, but with caution and human help

Artificial intelligence is a powerful tool, and an expert says we had better ensure it stays just that—a useful tool. Image: iStock/Blue Planet Studio Artificial intelligence is fast becoming the saving grace when it comes to cybersecurity. In a recent post, Reliance on AI in response to cyber attacks 2019, by country, on Statista, Shanhong Liu said: “As of 2019, around 83% of respondents based in the United States believed their organization would not be…

Read More

CTO Cloud Tips for Sys Admins: Think Big, Use your Knowledge

CTO Cloud Tips for Sys Admins: Think Big, Use your Knowledge

System administrators, or sys admins, have long been the unsung heroes of enterprises, often forgoing sleep or meals to keep essential applications up and running for a company’s customers and users, no matter the problem. During the past year alone, IT specialists were sleeping in data centers to keep the entire business from crashing, not to mention educating entire workforces on how to work remotely and making sure they could access their tools. We’ve been…

Read More
1 3,269 3,270 3,271 3,272 3,273 3,613