If you’re like the majority of the world’s population, you’re probably cooped up in your home, wondering when life will return to normal. We hate to break it to you, but the new ‘normal’ won’t be so normal. The virtual workforce explosion has not only altered our...
The Future of Cybersecurity: COVID-19 Impacts
Cybersecurity was important pre-COVID-19, and it will be even more important post-COVID-19. As people around the globe are required to work from home, telework is becoming engrained into the fabric of billions of organizations, whether they like it or not. Does this...
How to Properly Support Your CISOs and IT Staff
What’s tech-savvy, focused and brings business success full circle? You guessed it— CISOs. CISOs and IT leaders are vital to the success of every organization. They’re the key orchestrators of an organization’s security performance and ensure that information assets...
Top 3 Security Concepts for WLAN Pros
Cybersecurity is a top priority for every organization and securing our organizations’ networked infrastructures plays a major role in the success of a meaningful security strategy. So why should Wi-Fi pros care about security? For starters, we live in a world where...
COVID-19 Cybersecurity Checklist: 4 Steps to Secure Remote Workers
COVID-19, better known as the coronavirus, has imposed tremendous impacts on economies, financial markets, hospitality, tourism, manufacturing and transportation industries worldwide. As this virus continues to spread rapidly, many businesses and schools are closing...
5 Technical Recommendations for COVID-19 and Pandemic Preparation
We asked the engineering team what customers should be considering during the time of COVID-19 and other pandemic or natural disasters. Be aware of phishing emails Phishing emails and malicious activity increase during times of crisis. Attackers are opportunistic, so...
3 Ways to Measure the Effectiveness of Your Cybersecurity Program
No one thinks they’re at risk of being targeted until it’s too late. A security attack can wreak havoc on any individual or company, causing potential legal, financial and operational disturbance. With more emerging security threats on the horizon than ever before,...
Emerging Security Threats: Defending Your Organization from Deepfake Technology
Following Facebook’s recent decision to ban deepfake technology from its social platform, many other social media companies are following suit, cracking down on what Mark Zuckerberg has called an “emerging threat.” Deepfake has quickly transcended from YouTube and...
Iran Cyber-Response: 4 Recommendations for Defending Your Organization from Nation-State Attacks
Forceful revenge said to follow in response to a recent U.S. airstrike, resulting in the death of Iran’s top general Qassem Soleimani, is predicted to disrupt our lives in unprecedented ways. The cybersecurity threats facing the U.S. range from widespread economic and...
Our Best CLI Cheat Sheet: Cisco, Aruba CX, and Aruba OS Switch
This is the latest version of our favorite CLI Reference Guide showing popular platforms side-by-side for easy configuration on Cisco and Aruba. If you’ve purchased HPE Aruba Networking equipment from us (Carolina Advanced Digital), and/or if you’ve worked with our...