Blog

Equip yourself with the know-how to defend against modern threats, ensuring your business remains resilient in the digital age.
Introducing Phish Resistant MFA

Introducing Phish Resistant MFA

Keeping accounts and credentials secure requires on-going development and the implementation of sophisticated techniques. As phishing campaigns continue to grow in frequency and their methods become more advanced, authentication processes must also continue to...

read more
Meraki Marketplace Expanded

Meraki Marketplace Expanded

In our previous newsletter, we briefly discussed the Meraki Marketplace and how its wide variety of apps integrate seamlessly into the Meraki platform, providing customized solutions for several unique use cases. Today we’ll cover some of these in-depth to show just...

read more
Cisco Spaces & Meraki IoT

Cisco Spaces & Meraki IoT

Workplaces around the world are seeing technology play a key role in their transformation, supporting hybrid environments using real-time data and monitoring. At most Cisco offices for example, employees and visitors will see digital signage at the entrance that...

read more
The Importance of Penetration Testing

The Importance of Penetration Testing

There’s no denying that most businesses have embraced digital practices now, and cybersecurity for businesses is more important than ever. The last thing any business wants is for outsiders to get data from their business. Even with cybersecurity meeting current...

read more
Security Fundamentals – Smart Social Media Use

Security Fundamentals – Smart Social Media Use

Social engineering is a manipulation technique used by cybercriminals to trick you into taking a specific action or divulging confidential information without thinking. We’ve previously covered tips on how to spot phishing emails in the workplace by identifying some...

read more

Newsletter

CSOLVE July Newsletter

CSOLVE July Newsletter

Cybersecurity is not only a concern for large corporations, but also for small businesses that may be more vulnerable to cyber-attacks. According to Accenture, small businesses accounted for 43% of cyber-attacks in 2019, but only 14% had adequate security measures in...

read more
The Human Firewall

The Human Firewall

The battle against cybercriminals and hackers requires constant vigilance. While modern security appliances and software are highly sophisticated, it is important to avoid complacency and reliance solely on these security tools. This is why the human firewall is...

read more
CSOLVE April Newsletter – 2023

CSOLVE April Newsletter – 2023

With the flood season upon us, and increased frequency of extreme weather events, there is a greater demand for alerting on the physical environments we work in. The Meraki network can be used for much more than just wireless connectivity and security appliances....

read more
AI in the Workplace 💻

AI in the Workplace 💻

As we move further into 2023, Artificial Intelligence (AI) continues to shape how we work, consume entertainment, and interact with technology. From video upscaling and ChatGPT-generated writing to integration across various productivity tools, AI is quickly becoming...

read more
C-SOLVE February Newsletter

C-SOLVE February Newsletter

Cisco Meraki is at the core of many managed enterprise networks. You may be wondering though, what is Meraki and what does it do? Meraki is a platform of networking devices including security appliances, switches, access points, cameras, and more. In this newsletter...

read more
Skip to content