Tektonika Staff October 15, 2019 4 Minute Read

Vulnerability assessment vs penetration testing: Which is right fo…

Vulnerability assessment vs penetration testing—these terms are often used interchangeably, but they each have distinct benefits to offer.


Carrie Dagenhard October 14, 2019 4 minute read

An IT leader's guide to serverless computing

What are the advantages of serverless computing for IT? Could the tech impact your security? Here's some helpful background on this popular service.


Alex Holland October 11, 2019 12 Minute Read

Buran Ransomware Targets German Organizations Through Malicious Sp…

As of October 2019, commodity ransomware campaigns conducted by financially motivated threat actors pose a significant threat to organizations. The three disti…


Tektonika Staff October 11, 2019 4 Minute Read

How to avoid social media cyber attacks

People use social media for many reasons, but social media cyber attacks shouldn't be one of them. Here's how to avoid them.


Jasmine W. Gordon October 10, 2019 4 minute read

4 IT disaster recovery strategies for small government agencies

When a disaster comes to your small government office, are you ready? Discover 4 IT disaster recovery strategies to prepare for hacks or natural disaster.


Rose de Fremery October 9, 2019 5 minute read

A CIO's guide to strengthening network access control

Here's how CIOs can ensure proper network access control and still enable employee productivity.


Tektonika Staff October 8, 2019 5 minute read

Expand your sustainability efforts to include office printers

With climate change escalating fast, office printers represent an opportunity to decrease your business's carbon footprint and become more sustainable.