Blog Archive - 2010

December 20, 2010
If Your Calls Go over VoIP, Will Someone Else be Listening?

You've probably heard that many businesses are moving from traditional telephone services to voice over IP (VoIP) services in order to reduce costs and gain more efficient networks. You may be considering this move for your business, but you hesitate because of nagging doubts about VoIP security.

By Diane Giuffre
December 10, 2010
Are You an Online Target for Organized Crime?

In the movies, members of organized crime rings operate from the shadowy corners of a neighborhood restaurant or the back of a limousine with darkened windows. Do you have visions of The Sopranos episodes running through your mind? In reality, today's organized crime is more likely to take place in a brightly lit office, using the latest computer and networking technology.

By S.L. Sweet
November 30, 2010
Tips for Choosing a MSSP

Security as a Service (SaaS) offerings are prompting many businesses to consider finding new ways to manage their network security functions. Yet there can be a high level of anxiety when you think about handing something as critical as network security over to an outside party. The question becomes, how do you find a SaaS provider matches well with the way you want to manage your network security?

By S.L. Sweet
November 13, 2010
SaaS Providers: Do You Want a Specialist or Generalist?

Security as a Service, also called SaaS, is becoming an increasingly viable model to consider for protecting your network. Under this model, one or more service providers takes on tasks such as monitoring network activity for security threats, managing your security equipment, or identifying the operations and issues that make your business vulnerable to internal and external threats.

By S.L. Sweet
November 8, 2010
Protecting Your Mobile Workforce from Sheep (Firesheep, that is)

One of the hottest discussion topics in networking circles recently has been Firesheep, an extension to the Mozilla Firefox web browser. Firesheep allows a hacker to access someone else's browsing session when they are sharing the same Internet connection.

By MegaPath Marketing
October 20, 2010
Take Another Look at Ethernet

A true Business Ethernet service uses traditional copper wiring to deliver the bandwidth (up to 20 Mbps), service-level agreements (SLAs), and features that are needed for today's demanding applications--including video and voice.

By Michael Francois
CALL US: 877-634-2728 to speak to one of our Business Consultants today.