Andrea Gross

  • Cybersecurity for small business, how does it work, and why is it important?

    Cybersecurity for small business, how does it work, and why is it important?

    You might think that cybercriminals only target big businesses, but any company can be a target. Attacks on big business get the most media attention, but cybersecurity is crucial to companies of...

    Go to page
  • Cybersecurity for small business, how does it work, and why is it important?

    Cybersecurity for small business, how does it work, and why is it important?

    You might think that cybercriminals only target big businesses, but any company can be a target. Attacks on big business get the most media attention, but cybersecurity is crucial to companies of...

    Go to page
  • 7 must-have features for SASE

    7 must-have features for SASE

    Hybrid work is going mainstream. People will return to the office, but many will continue to work remotely. That’s why so many IT teams are moving to Secure Access Service Edge (SASE).

    Go to page
  • The 3 riskiest cloud applications of 2021

    The 3 riskiest cloud applications of 2021

    Are you using vulnerable cloud apps that open the door to ransomware, malware, or other types of network attacks? Our Cisco Umbrella infographic reveals the three riskiest ones in 2021.

    Go to page
  • Cisco Umbrella launches new data center in Madrid, Spain

    Cisco Umbrella launches new data center in Madrid, Spain

    Cisco Umbrella is proud to announce the addition of our most recent global cloud data center, Spain! Our DC is located in Silicon Alley, not to be confused with Silicon Valley. We chose this...

    Go to page
  • Cisco Umbrella launches new data center in Madrid, Spain

    Cisco Umbrella launches new data center in Madrid, Spain

    Cisco Umbrella is proud to announce the addition of our most recent global cloud data center, Spain! Our DC is located in Silicon Alley, not to be confused with Silicon Valley. We chose this...

    Go to page
  • Cybersecurity threats: Top of the charts

    Cybersecurity threats: Top of the charts

    Cyberattackers have not been slowed down by the worldwide pandemic. Phishing, cryptojacking, and trojans all continue to dominate the cybersecurity threat charts.

    Go to page
  • Most common cybersecurity threats of 2021 broken down by industry

    Most common cybersecurity threats of 2021 broken down by industry

    In today’s modern threat landscape, it’s hard to properly allocate resources where they’re needed most. Is it cryptomining, ransomware, phishing or some new threat that no one has faced before? It...

    Go to page
  • Most common cybersecurity threats of 2021 broken down by industry

    Most common cybersecurity threats of 2021 broken down by industry

    In today’s modern threat landscape, it’s hard to properly allocate resources where they’re needed most. Is it cryptomining, ransomware, phishing or some new threat that no one has faced before? It...

    Go to page
  • Protective DNS: What it is, why it matters, and what you need

    Protective DNS: What it is, why it matters, and what you need

    Earlier this month, the National Security Agency (NSA) and Cybersecurity Infrastructure Security Agency (CISA) issued an advisory on the growing need to introduce a protective DNS (PDNS) solution...

    Go to page
  • Cisco launches new Secure Access Service Edge (SASE) data centers in Northern Europe for security customers

    Cisco launches new Secure Access Service Edge (SASE) data centers in Northern Europe for security customers

    Cisco Umbrella recently added new data centers to serve customers in Denmark and Sweden and we could not be more excited! When selecting data center locations, we look at several criteria,...

    Go to page
  • Cryptomining, phishing & trojan threat trends and how to block

    Cryptomining, phishing & trojan threat trends and how to block

    For the majority of 2020, in the face of a global pandemic, the entire world grappled with massive change — in how we lived, how we worked, how we connected. But one area that’s always been...

    Go to page
  • Keep these 10 things in mind as you start with SASE

    Keep these 10 things in mind as you start with SASE

    Every journey starts with one step. Whether that step is the first toward climbing a mountain or launching the campaign to keep your organization safe from cyberthreats, it’s important just to...

    Go to page
  • loading
    Loading More...