Blog
Cyber Security Risk Mitigation: Statistics & Strategies
Sat, 03/23/2019
Curious about what your fellow IT professionals think about the state of cybersecurity and the risks we face at every turn? Get the visual scoop below with high-impact graphics from the recent study Fortra conducted.
Blog
5 Cybersecurity Resources You Shouldn’t Scroll Past
By Robin Tatam on Sat, 03/16/2019
It's tough to stay on top of the latest cyberthreats and what they mean for your business. Here are some go-to resources that makes it easier to educate yourself on this important topic.
Blog
Cryptoviral Extortion: The Enduring Problem of Ransomware
By Bob Erdman on Wed, 03/13/2019
Learn about the long arms of ransomware, and how to protect your organization from its grasp.
Blog
12 Skills Every Security Administrator Needs for Success (and How to Learn Them)
By Robin Tatam on Sat, 03/09/2019
Mastering these 12 skills can make a security administrator a powerful weapon against data breaches.
Blog
HR Automation Tips Part 3: What Happens When You Automate HR Processes
Sat, 03/09/2019
Automating your HR processes can transform the way your human resources department operates. Find out what will happen when you automate HR.
Blog
5 Myths About Encryption on IBM i
By Robin Tatam on Mon, 03/04/2019
Keep reading as we investigate five common IBM i encryption myths and separate reality from fantasy.
Blog
35 Cybersecurity Risks for IBM i Administrators and How to Thwart Them
By Robin Tatam on Wed, 02/27/2019
Here’s a rundown of commonly overlooked IBM i cybersecurity risks and how to make sure they don’t open your business up to a disastrous situation.
Blog
What's the Difference? RPA vs BPA
Tue, 02/26/2019
Learn the difference between robotic process automation (RPA) and business process automation (BPA) and how both can help streamline tedious tasks and make processes more efficient.
Blog
The Efficiency Perks of Cloud Automation
Fri, 02/15/2019
Whether you’ve got a full cloud presence already built or are evaluating how to begin, learn more about the benefits of cloud automation.
Blog
8 User Groups & Communities to Join for RPA Fans
Fri, 01/25/2019
As you begin learning about robotic process automation (RPA) and how it can support improved task handling throughout your organization, finding user groups and communities of like-minded individuals and experts can be a big help.
Blog
Compliance Tasks Made Easy with RPA: Control Your Data for Seamless Compliance
Mon, 01/21/2019
Data security is a top concern for modern businesses. And many organizations have industry standards, like HIPAA or government regulations, like GDPR, they must stay compliant with. Keeping your data secure and your processes compliant can seem complicated, especially if you’re using many different types of business applications in your daily tasks. That’s why it’s important to choose tools with built-in security.
Blog
User Groups, and Forums, and Blogs, Oh My: Top 7 Linux Resources to Increase Your Expertise
By Bob Erdman on Mon, 01/14/2019
Find what you need in our compiled list of Linux resources.
Blog
Avoid an IBM i Cyber Attack: 6 Things to Check Regularly
By Robin Tatam on Wed, 01/09/2019
If you don’t want to make headlines with the next major data breach, here are six things to check regularly on IBM i.
Blog
3 Ways Malware Can Reach Your IFS
Thu, 12/13/2018
It's true that IBM i can't be infected by a PC virus. It's also true that the IFS can act as a host and spread malicious programs throughout your environment.
Blog
Cyber Risk Ratings: How Would Your IT Environment Score?
By Bob Erdman on Wed, 12/12/2018
Find out the type of cyber threats that endanger organizations (and their ratings), and how they can protect themselves.
Blog
Why Corporate Networks are Key Targets for Cryptojacking
By Bob Erdman on Thu, 12/06/2018
The days of being able to ignore cryptocurrency is over. Even if you don’t use it, you’re now at risk of being adversely affected by it through cryptomining malware, also known as cryptojacking. Read on to find out what cryptocurrency is, how cryptojacking is on the rise, and how you can protect your organization.
Blog
What’s the Difference Between Endpoint Antivirus and Endpoint Security Software?
By Bob Erdman on Wed, 11/21/2018
The only honest answer to the question about the difference between endpoint antivirus and endpoint security is that it depends on who you ask. Read on as we highlight the three most common interpretations to this cyber security identity crisis.
Blog
Is There Such a Thing as Free Antivirus for Businesses?
By Bob Erdman on Tue, 11/06/2018
Despite countless offers for free antivirus solutions, there are many other types of costs to consider when choosing the solution that is right for you.
Blog
Malware, Virus, Anti-malware, Antivirus: What’s the Difference?
By Bob Erdman on Tue, 10/30/2018
Read on to find out the difference between malware and a virus, and how you can best protect your organization from them.