Blog
Discover what’s new
Our latest thought pieces

Understanding the Five Types of Cybersecurity
Cybersecurity is about more than firewalls or antivirus tools. It’s about more than authentication or policies. Rather, it’s a multidisciplinary, multifaceted pursuit, a process by which you work to actively protect your organization’s people, systems, and data. With that in mind, there are five core disciplines on which you should focus. Read on to learn more about each.

3 Reasons Why to Use Remote Workers and How to Do It
Telecommuting is the new normal. Remote work is no longer just a nice perk that you can offer your employees – we’re fast approaching an era where it’s downright essential. And that’s not the only reason you should consider implementing policies and processes to enable remote employees, either.

The Real Challenge in Cybersecurity? Businesses Simply Don’t Care
If you’re like most people, you’re probably tired of seeing the constant stream of data breaches and cyber-incidents in the media. You might blame the increasing capabilities of cyber-criminals. Ultimately, though, it can all be traced back to a single truth – as a whole, nobody cares enough about cybersecurity. How can we change that?

How Bad Behavior on Social Media Can Ruin a Career
Don’t say or do anything on social media you wouldn’t say or do in public. Those are good words to live by – yet for some reason, people seem to completely neglect them. Unfortunately, that kind of thing can really come back to bite you, especially if you’re working for a tech company.

Deepfake Technology Demonstrates the Darker Side of Artificial Intelligence
Videos known as deepfakes have begun making the rounds online. Originally popularized as a pastime, deepfakes are a startling example of artificial intelligence gone too far. It’s now possible to create a convincing, startlingly-realistic video of someone saying or doing something they never would. And that’s terrifying.

How Does the GDPR Impact Colocation?
The European Union’s General Data Protection Regulation remains one of the most far-reaching pieces of privacy legislation ever released. Depending on your customer base, failure to comply with the framework can result in some pretty hefty penalties. That’s true even if your business isn’t located in the EU.

How to Discover Your Biggest Cybersecurity Blind Spot
Everyone has blind spots. You are no exception, no matter how conscientious you believe you are. That doesn’t simply apply to your personal life, either. Your business has them too, particularly where cybersecurity is concerned. If you really want to protect your data, you need to understand that.

How to Defend Your Business Against Phishing Scams
Phishing is one of the oldest and most widely-used cyberattack tactics for one reason: because it works. No matter how you harden your systems against intrusion, there’s always the chance that someone will open a malicious attachment. You can’t prevent that entirely, but you can mitigate it. Here’s how.

How Is Colocation Different From Cloud Hosting?
When it comes to high-demand, remote hosting, there are two heavyweight contenders. And they aren’t necessarily who you think they are, either. I’m speaking of cloud hosting and colocation. They actually have a lot more in common than you’d think. Even if they do differ in a few core ways.