The Key Point Blog

10/10/2022

Mark DiMattei

How to keep your data secure in hybrid environments

Keypoint Intelligence has been tracking how things have changed since the pandemic, first in our Future Office study and now in the Future of Work survey. We take a look at cybersecurity measures companies are investing in for their new environments as well as some key points regarding data security in this infographic.

Read

09/21/2022

Keith Haas

Is your business protected from cyberattacks?

The conveniences that Internet-connected devices add to the lives of tech-savvy individuals and business professionals is welcome across the board, but having such interconnectivity comes with cybersecurity risks.

Read

07/05/2022

Jamie Bsales

Looking the latest cyber threats and how to combat them

Sponsored by ConnectWise, the leading vendor focused on managed IT services providers, the IT Nation Secure event focused on cybersecurity for several audiences. We discuss here the highlights of the event as well as some of the challenges facing cybersecurity professionals today.

Read

06/06/2022

David Sweetnam

A look into the newer, shinier hacker of our digital landscape

Cybersecurity is an ever-growing issue in our highly digital world, one that is becoming far more refined than the days of suspicious looking e-mail links.

Read

01/28/2022

Mark DiMattei

It’s 2022: Do you know where your data’s been?

This blog discusses the National Cybersecurity Alliance’s Data Privacy Week and provides general ideas on how businesses can better utilize client data ethically.

Read

10/07/2021

Keypoint Intelligence

Understanding the active role of cybersecurity protection

This blog explores the main points of threat detection and response to help focus on a clear topic during Cybersecurity Awareness Month. We provide insight into how to form a threat detection team and the benefits for businesses and the print industry specifically.

Read

04/26/2021

Jamie Bsales

New data indicates attacks by state-sponsored hackers have doubled in the last three years

The report shows that almost 30% of the cyber threats captured by the HP threat team were previously unknown, as attackers increase their use of smokescreen techniques to evade detection tools.

Read

10/29/2020

Keypoint Intelligence

This week’s theme: “The Future of Connected Devices”

In the fifth and final blog of our NCSAM series, we explore the future of cybersecurity through expert opinion and outside studies.

Read

10/22/2020

Keypoint Intelligence

This week’s theme: “Securing Internet-Connected Devices in Healthcare”

The theme for this week's cybersecurity blog is specific to securing devices in healthcare. We explore common vulnerabilities and opportunities for protective measures.

Read

10/14/2020

Keypoint Intelligence

This week’s theme: “Securing Devices at Home and Work”

Any cybersecurity professional will tell you there is no way to be 100% secure, but there is a short list of things that you can do to hedge your chances of mitigating a risk. This week's NCSAM blog explores the ways to be as safe as possible.

Read