Blog

Install, Move, Add, Change (IMAC): 5 Steps to Better Employee Experiences

In the past few months, companies have had to transform the way they function. Many employees now work from home, connected to operations electronically. That raises the bar on employee technologies.

At the same time, many customers are curtailing purchases, hampering revenues...

4 Ways to Leverage a Cloud-based Contact Center to Deliver Better Customer Experiences

Uncertain markets are bringing customer care to the forefront. Customers are more cautious about spending. Brands need to protect revenues. That’s why more organizations are turning to the cloud to manage their contact centers.

But to achieve the best results, you need an...

Crushing Collaboration Clouds in the Work-From-Home Era

By Chris Driggers

For many workers, digital collaboration has become a way of life. Enterprises typically manage these tools in their data center. But this on-premises approach involves the high overhead of upfront costs and ongoing management. It also fails to keep up with our...

Research: Many Organizations Still Take a Reactive Approach to Cybersecurity

Organization are putting a lot of time, money and effort into combating cybersecurity threats. In TechTarget’s 2017 IT Priorities Survey, IT professionals said they spend 23 percent of their time on security-related activities. Only “general IT management” ranked higher, at 27...

Are Your IT Assets Being Disposed of Securely?

Everybody talks about the proliferation of desktop and mobile devices and various Internet-connected objects, including medical monitors and industrial and manufacturing equipment. Everybody talks about the enormous volume of data that is constantly being generated and stored...

The Role of Incident Response in Effective Cybersecurity

A data breach is a costly event. As I noted in my last post, shipping firm Maersk fell victim to a NetPetya malware attack that brought estimated revenue losses of $200 million to $300 million during two weeks of business disruption. That’s many times the $3.62 million average...

Maersk Attack Illustrates the Enormous Cost of Downtime

In a previous post, I discussed the dangers of “aftershock” attacks as organizations continue to feel the impact of the WannaCry ransomware attack. Microsoft issued an emergency patch for the exploit behind WannaCry, but the malware continues to impact PCs and servers running...

Why ‘Aftershock’ Attacks May Bring More Tears than WannaCry

LG recently confirmed that some of its self-service kiosks in South Korea were infected with WannaCry, forcing the consumer electronics manufacturer to shut down some of its systems to prevent further spread of the malware. It’s the latest outbreak of the worst ransomware attack...

Why Security Is Critical to the Success of the Internet of Things

In my last post, I discussed the shared responsibility model of cloud computing, and why organizations must take steps to protect the applications and data that they move to public cloud platforms. Cloud providers are only responsible for securing their infrastructure — not...