Home > Support > Blog
9 Tips for Reducing the Risk of Ransomware

9 Tips for Reducing the Risk of Ransomware

Ransomware is a high-tech spin on the age-old art of the shakedown. Cybercriminals use malware to encrypt data on a victim’s systems, then demand a ransom to decrypt them. The crooks are betting on the fact that organizations rely heavily upon their data and will be willing to pay to regain access to the files.
Tuesday, July 19, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (1976)/Comments (0)/
How Wi-Fi Is Making Brick-and-Mortar Retailers More Competitive

How Wi-Fi Is Making Brick-and-Mortar Retailers More Competitive

When it comes to engaging customers inside the store, mobile apps for coupons, discounts and loyalty points are the most popular tools, employed by 69.9 percent of respondents who are active in tech-centered marketing. 
Wednesday, July 06, 2016/Author: Yaron Reshef - Chief Engineer/Number of views (2018)/Comments (0)/
Should You Move Unified Communications to the Cloud?

Should You Move Unified Communications to the Cloud?

Many organizations are utilizing cloud-based UC applications and services and taking advantage of the Unified Communications-as-a-Service (UCaaS) delivery model. Single-tenancy UCaaS integrates a customized software platform with in-house applications. Organizations can also utilize a multi-tenancy approach in which multiple companies share a single software platform. A hybrid approach enables organizations to host and control some UC tools and services onsite while moving others to the cloud.


Friday, October 24, 2014/Author: The SageNet Team/Number of views (2047)/Comments (0)/
Tags:
Gaining Maximum Value from Unified Communications

Gaining Maximum Value from Unified Communications

Luckily, the concept of voice, video and data as distinct elements of business communications is rapidly fading thanks to IP communications systems. Once voice calls, email, instant messaging and all forms of conferencing are carried over a common IP network, it is possible to manage them from a single point.


Wednesday, October 22, 2014/Author: The SageNet Team/Number of views (2295)/Comments (0)/
Notes from FSTec: How Technology Is Impacting Foodservice

Notes from FSTec: How Technology Is Impacting Foodservice

Is your data secure? That question was the topic of one of the keynote sessions at the 2014 FSTEC Conference. As evidenced by recent high-profile breaches, even the largest firms find it challenging to create an impenetrable security infrastructure.  Foodservice organizations must take steps to strengthen their security posture, particularly when it comes to point-of-sale systems, or else risk losing hard-earned customer loyalty in the wake of a security breach.

Monday, October 13, 2014/Author: The SageNet Team/Number of views (2742)/Comments (0)/
RSS