Most Recent Articles
How telcos can win with SMBs: Strategies for success
Infographic from STL Partners, a leading analyst serving telcos and service providers. It summarizes STL research on the significant opportunity for telcos from SMB, with security as a top opportunity
Protection Inside and Outside the Office: The New State of Cybersecurity
More and more employees are working outside of the central office — and often outside its protection. To secure these remote workers and locations requires a fundamentally different approach. A...
The Truth About Shadow IT
Think employees aren't prioritizing speed over security? Think again.
3 Easy Ways to Secure Your K-12 School District
Some solutions promise to check all the boxes on network security. But it turns out, they're checking all the wrong ones. Learn how Cisco Umbrella secures your entire school district in minutes.
Miners in the Shadows: Extracting Treasure with Stolen Resources
Malicious cryptomining lets cybercriminals profit at your organization’s expense. Find out who they’re targeting and how to protect your network.
We Are Better
People make a lot of claims about network security. We’d rather show you proof. Cisco Umbrella delivers 100% reliability worldwide and we’ve been doing it for 12 years.
3 Red Flags You're Not Getting the Security You Were Promised
Some solutions promise to check all the boxes on network security. But it turns out, they're checking all the wrong ones.
Six Degrees of Network Security
There are a number of obstacles standing between you and safe network. Your security shouldn't be one of them.
This is a story about Cisco Meraki MR and Cisco Umbrella (and Bob).
Here are 5 things Bob can do by adding a layer of cloud-delivered protection with Cisco Umbrella - and you can, too!
Are you getting what you were promised?
Are you getting what you were promised? People make a lot of claims about network security. We’d rather show you proof.
Ransomware: An epidemic for the healthcare industry
Get the facts on ransomware attacks targeting the healthcare industry — how they work, your first line of defense against them, and how to protect data systems for PII and PHI.
Five reasons for the rise of the secure internet gateway
Investigate attacks like never before
Attackers are pivoting through your infrastructure. What if you could pivot through theirs?
Small Business is BIG business for hackers
MSPs are up against cybercriminals that have adopted a standard, modern business model. And it's paying off.
Cisco Umbrella / CDW – Defending the Healthcare Perimeter
Keep your school district safe from hackers and ransomware
Don't Risk It. Higher education cybersecurity 101
Ransomware Defense Checklist
Use this checklist to ensure you have everything covered to prevent a future ransomware attack.
Investigate Use Case
Sample work flow using Investigate during incident response
A Network Manager's Guide to Ransomware