×

Security

Carrie Dagenhard October 14, 2019 4 minute read

An IT leader's guide to serverless computing

What are the advantages of serverless computing for IT? Could the tech impact your security? Here's some helpful background on this popular service.

Security

Alex Holland October 11, 2019 12 Minute Read

Buran Ransomware Targets German Organizations Through Malicious Sp…

As of October 2019, commodity ransomware campaigns conducted by financially motivated threat actors pose a significant threat to organizations. The three disti…

Mobility

Tektonika Staff October 11, 2019 4 Minute Read

How to avoid social media cyber attacks

People use social media for many reasons, but social media cyber attacks shouldn't be one of them. Here's how to avoid them.

Security

Jasmine W. Gordon October 10, 2019 4 minute read

4 IT disaster recovery strategies for small government agencies

When a disaster comes to your small government office, are you ready? Discover 4 IT disaster recovery strategies to prepare for hacks or natural disaster.

Security

Rose de Fremery October 9, 2019 5 minute read

A CIO's guide to strengthening network access control

Here's how CIOs can ensure proper network access control and still enable employee productivity.

Innovation

Tektonika Staff October 8, 2019 5 minute read

Expand your sustainability efforts to include office printers

With climate change escalating fast, office printers represent an opportunity to decrease your business's carbon footprint and become more sustainable.

Security

Rose de Fremery September 24, 2019 4 minute read

Know your certifications: What is ISO 12647?

You've heard of ISO 27001, but have you run into ISO 12647 before? Here's a brief primer on one of the less common ISO certifications.