Call Sales
800-890-5231
Call Support
877-523-5175
 

MegaPath Blog

Blog Archive: ALL | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011

Blog Posts Featuring Security Services

April 25, 2017
SD-WAN Eliminates Challenges of Delivering High-Quality Voice and Unified Communications over the Internet
SD-WAN Eliminates Challenges of Delivering High-Quality Voice and Unified Communications over the Internet

Over the past year, SD-WAN has become the popular approach to private networking. In this blog post we discuss why.

By MegaPath Marketing
December 19, 2016
Turning Risk into Reward: Selling SD-WAN and Cloud Resiliency
Turning Risk into Reward: Selling SD-WAN and Cloud Resiliency

Today’s businesses depend on their IT infrastructure and applications to work all the time, without disruption, and SD-WAN is becoming the popular solution.

By Dan Foster
November 21, 2016
Is Your Contingency Plan Ready to Avoid Disruption?
Is Your Contingency Plan Ready to Avoid Disruption?

Process and service disruptions, whatever the cause, can have a devastating economic impact on businesses. Take Hurricane Sandy, for instance. In the fall of 2012, this catastrophic storm impacted more than 300,000 businesses in the United States alone, with total economic losses estimated at 72 billion dollars.

By MegaPath Marketing
November 23, 2015
Preparing your Business for Mother Nature’s Worst
Preparing your Business for Mother Nature’s Worst

Every business needs to be ready to handle any situation or event that could affect operations. Here are eight steps you can take toward developing your own business continuity and disaster recovery plan.

By Paul Marra
November 16, 2015
Retailers: Are you Ready for the Shopping Season?
Retailers: Are you Ready for the Shopping Season?

The shopping season looks promising, especially for companies that engage with consumers over mobile. Discover the trends, and a few tips to help retailers head into this make-or-break time of the year with a great game plan, great partners and solid solutions that will improve their cost position.

By Paul Marra
November 9, 2015
Risks and Rewards of Over-the-top Business VoIP and UC Services
Risks and Rewards of Over-the-top Business VoIP and UC Services

Cloud-based Voice and Unified Communications services offer tangible business benefits including cost savings and increased mobility. A key decision factor is whether to go with a fully managed Hosted Voice / UC service or one that is delivered over-the-top. Compare and contrast the strengths of each in meeting the communications and collaboration needs of today's workforce.

By Paul Marra
October 31, 2015
Beware the Risks of Free File Sharing and Storage Services for Your Business
Beware the Risks of Free File Sharing and Storage Services for Your Business

Employees are bringing their favorite cloud services into your network. What kinds of risk could these consumer grade apps pose?

By Matt Mayhew
October 12, 2015
Five Triggers for Moving to the Cloud
Five Triggers for Moving to the Cloud

These five events prompt many companies to move infrastructure, data, or applications to the cloud.

By Matt Mayhew
September 30, 2015
What to Look for in a Managed WiFi Solution
What to Look for in a Managed WiFi Solution

The adoption of Wireless devices presents challenges for IT and unprecedented opportunities for businesses. Consider a Managed WiFi solution and these tips for choosing one.

By Matt Mayhew
September 14, 2015
What BYOD Forecasts Mean for your IT Department
What BYOD Forecasts Mean for your IT Department

The ‘bring your own device’ trend is bound to continue bringing new challenges for already overtaxed IT departments.

By MegaPath Security and Compliance Team
August 24, 2015
Essential Questions to Ask Before Purchasing VoIP Services
Essential Questions to Ask Before Purchasing VoIP Services

Avoid the “fine print blues” (also known as buyer’s remorse) when buying a Hosted Voice service. Our list of insightful questions can get you started shopping smartly.

By Paul Marra
August 10, 2015
Rethinking Remote Office Backup
Rethinking Remote Office Backup

Seat belts, insurance policies, and savings accounts: these are all examples of things we do to prepare ourselves for the unexpected. Has your organization taken the necessary measures to protect your business’ critical data from unforeseen events that could wipe out your data—such as natural disaster, human error, and malicious attacks?

By Matt Mayhew
February 9, 2015
Three Important Email Security Features You May Not Have Considered
Three Important Email Security Features You May Not Have Considered

Cyber-attacks, electronic espionage, and intellectual property lawsuits make headlines almost daily, making strong email security more important than ever.

By Matt Mayhew
October 20, 2014
Why a Service Provider Partnership is Essential for New PCI DSS Mandates
Why a Service Provider Partnership is Essential for New PCI DSS Mandates

Preparing for PCI DSS 3.0 and maintaining ongoing compliance promises to be a daunting challenge, especially for companies that lack the necessary resources or expertise. In this second part of a two-part blog, we discuss the advantages of partnering with a service provider that offers expertise and services for PCI compliance.

By MegaPath Marketing
October 6, 2014
PCI DSS Mandates Will Bring “Security Culture” to Retail Industry
PCI DSS Mandates Will Bring “Security Culture” to Retail Industry

The Payment Card Industry Data Security Standard (PCI DSS) 3.0 raises the bar on data protection standards. In this first part of a two-part blog, we describe some of the ways PCI DSS 3.0 is different and the rationale behind the stricter requirements.

By MegaPath Marketing
September 30, 2014
MegaPath Customer Advisory: Shellshock
MegaPath Customer Advisory: Shellshock

Shellshock Bug Customer Advisory: The advisory includes information about MegaPath's security practices and the outcome of MegaPath's security audit relating to the Shellshock bug.

By MegaPath Security Team
June 9, 2014
Retail Technology Tips: Use a Solid Network and Big Data to Gain a Competitive Advantage
Retail Technology Tips: Use a Solid Network and Big Data to Gain a Competitive Advantage

Many businesses have discovered the customer service and revenue opportunities that are available when they accurately analyze and leverage big data.

By MegaPath Marketing
April 14, 2014
MegaPath Customer Advisory: Heartbleed Bug
MegaPath Customer Advisory: Heartbleed Bug

MegaPath has issued a customer advisory to address the recently announced security flaw in OpenSSL, known as Heartbleed. The advisory includes information about MegaPath's security practices and the outcome of MegaPath's security audit relating to the Heartbleed bug.

By MegaPath Security Team
January 20, 2014
The Benefits of Unified Threat Management and Managed Security Services
The Benefits of Unified Threat Management and Managed Security Services

Increased accessibility to cross-platform data sharing and ever-changing and increasingly malicious threats make Managed Security Services a necessity for businesses today.

By MegaPath Marketing
December 9, 2013
Calculating the True Cost of a Data Breach
Calculating the True Cost of a Data Breach

Data breach and data loss make headlines almost daily. Now, there's a calculator to help you understand the potential impact of a breach to your business.

By MegaPath Marketing
I confirm that I have read and agree to the terms and conditions defined in the MegaPath Acceptable Use Policy.
I confirm that I have read and agree to the terms and conditions defined in the MegaPath Acceptable Use Policy.
I confirm that I have read and agree to the terms and conditions defined in the MegaPath Acceptable Use Policy.