Blog
Advanced Phishing Techniques
As security solutions continue to advance, so too do the techniques that threat actors employ in their attempts to bypass security. As threats continue to develop it is important to remain vigilant and aware of security trends to build a strong human firewall. There...
The Ethics of Artificial Intelligence
The implementation of Artificial Intelligence (AI) in the workplace will be one of the biggest trends in 2024. Technologies around AI are developing rapidly, and organizations large and small are hedging their bets on its use to improve productivity and output...
Improving Workplace with Cloud-Managed Environmental Sensors
Today, organizations are increasingly turning to smart technologies to streamline operations, enhance productivity, and promote sustainability. One such innovation making waves is the integration of cloud-managed environmental sensors into workplaces, creating...
Introducing Phish Resistant MFA
Keeping accounts and credentials secure requires on-going development and the implementation of sophisticated techniques. As phishing campaigns continue to grow in frequency and their methods become more advanced, authentication processes must also continue to...
Meraki Marketplace Expanded
In our previous newsletter, we briefly discussed the Meraki Marketplace and how its wide variety of apps integrate seamlessly into the Meraki platform, providing customized solutions for several unique use cases. Today we’ll cover some of these in-depth to show just...
Business Continuity Planning with Managed Services: A Step-By-Step Guide
Business continuity planning (BCP) is devising a strategy to ensure that your business can maintain operations in the face of disruptions, whether from natural disasters or cyberattacks. Managed services providers (MSPs) can be invaluable in aiding companies with...