, , , ,

Survey results show cyber threats are shaking IT confidence

Posted on February 23, 2017

Late last year, we released Intermedia’s inaugural IT Confidence Index. To recap: we measured the confidence levels of 350 IT decision makers (ITDMs) on a 10-point scale where 0 represents […]

,

When “I love you” translates to “my password is ___”

Posted on February 14, 2017

In honor of Valentine’s Day, we’re showing cybersecurity some love by discussing how employees can keep their personal online information secure and separate from their work-related […]

, , , ,

ARCpoint Labs Achieves Email Uptime and Encryption for Franchisees with Intermedia

Posted on February 9, 2017

Downtime is not an option. For most companies, email downtime can grind business to a halt. In fact, the average cost to a business for email downtime was $870,000 in 20151. Add viruses, […]

,

“Go Phish!” Ryan Barrett and Forbes discuss the value of hacking your employees

Posted on January 24, 2017

“Go Phish!” The name of an iconic childhood card game takes on a menacing air with the addition of a single letter. But in the same way that you chide a fellow card-player to […]

,

Ransomware goes viral

Posted on December 20, 2016

We’ve reached a new milestone in the evolution of ransomware: attackers are giving incentives for sharing. The recently-discovered Popcorn Time ransomware strain provides decryption for […]

, ,

Why you can’t forget about voice continuity planning

Posted on November 15, 2016

With winter storm season upon us and areas of the country already impacted by disruptions like wildfires, floods, and hurricanes, our very own Mark Sher, VP of Product Marketing for Cloud […]

,

Now is not the time to get complacent about ransomware attacks

Posted on November 10, 2016

Ransomware continues to be a major disruption to businesses and users.  Last week, the government of Madison County in Indiana had to resort to using pen and paper to manage police, […]

, ,

5 wacky ways we may soon verify our identities

Posted on October 4, 2016

Are your customers tired of passwords? They’re not alone. So many of us are overburdened with passwords that we end up compromising security for the sake of sanity. We take shortcuts — […]

After Yahoo!, we should all examine our password practices

Posted on September 29, 2016

Barely a week goes by without some high-profile story of a company being hacked and user logins being stolen, with the most recent example being Yahoo!. And while we may wish that passwords […]

,

Your hidden exposure in managing risk for HIPAA compliance

Posted on September 23, 2016

In our fourth issue of our blog series on HIPAA compliance, we look at the major risk you might not consider when addressing HIPAA compliance. You can read the third installment […]