VGA's addition to the panel is a significant achievement and reflects the company's expertise in the field of cyber security, championed by Thad Legg, VGA's General Manager/COO, who joined the company in 2018 with a strong Vendor cyber security background. VGA has a long history of providing high-quality IT solutions and services to a range of clients, including government agencies, educational institutions, and businesses. The company has a strong focus on security and has developed a range of solutions to help clients protect their data and systems from cyber threats.
A study by researchers at Lookout has found that credential-harvesting phishing attacks against US government employees rose by 30% last year. The researchers also found that nearly 50% of US government employees are running older, unpatched versions of iOS and Android operating systems.
“Virtual Graffiti is a trusted IT service provider for enterprises throughout Australia and New Zealand,” said Gordon Lawson, CEO of Conceal. “We look forward to growing our presence in the region by working with Virtual Graffiti to deliver advanced protection against browser-based threats and ransomware for customers in healthcare, government, hospitality and more.”
Now in its ninth year, the CRN Triple Crown Award spotlights top North American solution providers for displaying a tireless commitment to achieving high revenue, company growth, and unparalleled technical expertise within the IT channel.
October is Cybersecurity Awareness Month, and you are undoubtedly being bombarded with some fantastic advice on how to stay cyber safe.
For those of us non-cybersecurity experts, “phishing” refers to the fraudulent practice of tricking people into giving sensitive information by posing as someone else. You’re probably not a stranger to phishing schemes—it’s the most common type of cyber crime with over 52 thousand cases reported to the U.S. Internet Crime Complaint Center in 2021.
CRN’s annual Solution Provider 500 ranks North America’s largest solution providers by revenue and serves as the gold standard for recognizing the channel’s most successful companies. With a combined revenue of more than $434 billion, this year’s list represents an impressive amount of influence and impact wielded by these companies on today’s IT industry and the technology suppliers they partner with.
“We are extremely honored and proud to be awarded this accolade by Aruba,” said Director of Vendor Management at BlueAlly, Howard Sackstein. “We are only as good as our partner, and we owe huge debt of gratitude to our Aruba team. We have worked closely with them over the last few years to grow Brand Awareness across all channels, which has been a massive undertaking. The level of commitment and thoroughness shown in the driving pursuit to truly succeed in new and evolving markets has been exemplary. They’re a true example of setting the bar at the highest level. This has resulted in explosive growth across all our channels, especially in the SMB market.
“Joining BlueAlly will enable us to quickly expand our presence to a larger, national market,” said Paul H. Mauritz, President and CEO of NetCraftsmen. “Our current clients will continue to receive the same excellent service from our team. With this new financial investment along with the existing solutions and reach of BlueAlly, we’ll be able to expand the number of clients for whom we can solve tough IT challenges.”
According to a report from SonicWall, more than 500 million ransomware attacks hit in 2021—up by more than 134% from 2020. These threats aren’t just constant; they’re quick. Hackers steal encrypted valuable files before many organizations even realize a ransomware attack is happening. So, how can you protect your data?
The COVID-19 crisis has accelerated digital transformation initiatives to offer an improved customer experience and personalized services, all while tackling increasingly sophisticated cybersecurity threats. More than ever, organizations need flexibility to keep pace with business change, but they are often hindered by a sluggish and rigid network infrastructure.
90% of Americans are using their personal devices for work, risking their workplace by accidentally opening access to their company data. Keeping your company and employees safe from cyber-attacks can be done by just following these 5 simple rules.Today, it’s become even more complicated for companies to prevent cybersecurity breaches. That’s why businesses must understand that each employee, intern, and manager all play equal roles in protecting your private business data. A few examples worth mentioning include the Equifax breach which compromised the identity of millions of users and the Yahoo breach that affected essentially every single user of the service.Here are 5 easy ways you can mitigate these risks and start protecting your employees both online and in the office.
When Cisco created the first Security Outcomes Study earlier this year, five key practices emerged as being most critical to successful security programs. But why are these practices so impactful? And what should security leaders do to implement and maintain them? These questions (and more) have been answered in our newly published Security Outcomes Study, Volume 2:
Hackers launched a DDoS attack on a Twitch gaming tournament, leaving a small European country without internet for over a half hour.
There are plenty of business continuity threats that bring a frown to the faces of those of us in IT. 2021 brought us cold, heat, fires, hurricanes, and tornadoes. It is projected to cost U.S. businesses a collective $13.5 billion in 2022 just from damages associated with flooding. Companies bear many of those costs—insurance and other resources may help—but that doesn’t even take the added expenses of downtime into account.
Chances are, traditional SAN has been part of your lineup for many years—and you’ve likely wondered, “what else is out there?” We've been conducting some in-depth field research and discovered that HCI truly is the way to go.
Trust was historically the barrier to widespread implementation of remote work. That is, employers wondered if they could trust employees to do the right thing when they weren’t in the office, delivering the same level of performance or productivity when faced with the distractions of home. Until recently, working remotely in the comfort of home was perceived as a rare permission or privilege. As part of dealing with the challenges of the past 18 months, people adapted to completely different ways of living, learning and working. That missing trust in employees seems to suddenly be adopted and effectively so. But, trusting remote workers is very different from implicitly trusting the technology they use.