• Categories
  • Recent Posts
  • Popular Posts
  • Popular Tags

  • Can Your Municipality Protect Itself from a Ransomware Attack?

    With The Rise In Cybercrimes, Especially Ransomware, The Time To Mitigate Your Risk Is Now

    , Vice President of Government Sales and Marketing

    The news headlines are everywhere – especially since the war in Ukraine began – when numerous cyberattacks were reported against that country. Cybercriminals have not only launched attacks on all types of industries, but also on government organizations, both in the U.S.  and abroad. These bad actors want to steal sensitive information, compromise operations or hold data ransom for large amounts of money. (more…)

    Security

    ,

    Is your MFP an Easy Target for Hacking?

    How to Make Sure Your Office Printers are Protected and Secure

    , Vice President, Solutions and Vertical Market Business Development

    Picture this. You’re an office manager, and you’re starting to see employees back in the office. It’s great! There’s energy all around, a low hum of chatter and the occasional beep from the printer in the corner – nothing to worry about. Well, time to take those rose-tinted glasses off.

    Printers, as well as Multi-Function Peripherals (MFP), are an underestimated source for data breaches. Sure, when you think about a ‘hack attack,’ traditionally your mind would go to PCs, web applications, file servers, data centers, etc., because that’s where you can get access to file systems, credentials and crucial private information. A successful MFP breach can result in a hacker accessing all of the above. Your everyday office printer comes loaded with the ability to integrate with the corporate network to allow for scan to email and copy-and-scan accessibility. Most worryingly, breaches can happen without anyone knowing they have occurred. And a lack of MFP security and maintenance makes breaches even easier to execute.

    (more…)

    From Our Experts, Security

    ,

    For my most recent birthday, my daughter bought me a great tee shirt. The caption, “Make it a Blockbuster Night,” accompanies an illustration of the storefront. Most of us remember the excitement of making a trip to pick up a movie… or three. Good times. Fast forward to 2007, Netflix introduces streaming services. What? So, now I can order movies and shows, and they are delivered over the internet? No trip to Blockbuster? What’s the fun in that?  Well, apparently people found it quite fun to push buttons and enjoy something immediately. Without the ability to quickly react to compete with this new ‘virtual’ interaction, Blockbuster declared bankruptcy in 2010, and closed all corporate-owned locations by 2014. (more…)

    Cloud, Security

    ,

    Securing Your Mobile Workforce

    Three Steps To Addressing Print Security Challenges In 2021

    , Vice President, Solutions and Vertical Market Business Development

    Recently I had the pleasure of participating in a virtual event ‘Securing your Mobile Workforce’ with Gap Intelligence, a business intelligence services company, where we discussed the continuing security pressures facing businesses in 2021, and the different steps that can be taken to help protect a hybrid workforce. As shown by the recent Colonial Pipeline hack, no industry is outside of the danger zone and the impact can be wide-reaching, so here’s my rundown of the key challenges to be aware of, and some of the solutions we shared. (more…)

    From Our Experts, Security

    ,

    The 3 R’s Of Cybersecurity- Risk, Reputation, & Ransomware

    How To Navigate The Blueprint Of Cybersecurity

    , Director of Marketing and Communications, IT Weapons

    As the frequency of cyberattacks keeps rising, organizations need to be better prepared to mitigate such events. Cybercriminals are increasingly gaining access to tools such as ransomware, making it easier for them to launch attacks, and consequently, organizations must have a defined cyber risk management strategy to deal with these attacks. (more…)

    Security

    ,

    Credit Union Safeguards – Key Trends Towards A Secure Workplace

    Technology Is Shaping The Future Of The Modern Credit Union

    , SAFe Agilist, PMI-ACP, PMP,National Practice Manager, Legal & Finance

    Konica Minolta Business Solutions and its IT services division, All Covered, recently attended two national credit union conferences. The shows were packed with concerned executives and a few of the topics that were top of mind included emerging cybersecurity trends and regulatory and compliance issues. Credit unions today must strategize solutions to these issues in order to remain successful in the market and have more time to focus on the satisfaction of their members. (more…)

    Security

    , ,

    What We Can Learn From The Capital One Hack

    One Of The Largest-Ever Thefts Of Bank Data

    , Director of Marketing and Communications, IT Weapons

    You’ve probably seen the news. One of the world’s largest banks suffered a catastrophic data breach, compromising the personal and confidential information of more than 106 million people. In many cases, the hacker obtained social security numbers and banking information, which pose a great security risk to the affected account holders. Several pieces of additional information were also obtained by the hacker, such as email address, full name, birthdate, etc. (more…)

    Security

    ,

    How To Protect Your MFP End Users With Password & Data Security Measures

    Four Ways To Keep Your Business Safe Categories: Security

    , Area Vice President of Document Solutions, SymQuest, a Konica Minolta Company

    Most modern offices use a variety of connected devices to handle day-to-day operations. And while networked office equipment like multi-function printers (MFPs) provide several benefits to businesses, sometimes they can present hazards to business security. (more…)

    Security

    , ,

    “Smile. You’re on Camera.”- Has a new meaning with Intelligent Video Security Services

    As a kid, I remember walking into department stores, looking up to find, well… me. I’m on TV! Of course, like many of you, I took the opportunity to fool around on camera before my mom pulled me away from the intrusive lens. Before reel-to-reel media was developed to offer on-site recording, video surveillance systems involved constant monitoring. Then in the 70’s, about the time that I was acting out a scene from Sesame Street in the store lobby, VHS revolutionized videotaping and storage finally making it convenient for the user. (Man, I would love to have some of that old footage!) The point is, like countless other technologies, video surveillance systems have advanced exponentially, growing well beyond yesterday’s CCTV (closed-circuit television) systems. (more…)

    Security

    ,

    Talk about kicking off 2018 with a bang! In the first week of the new year, several researchers reported a newly-found vulnerability in processors designed by Intel, ARM and others: one that theoretically allows hackers to read even the most secure information on any device. (more…)

    From Our Experts, Security, Technology

    , , , , , , , , ,