Over a year ago, Microsoft announced Internet Explorer (IE) would be retired. That day has come and here’s what you need to know.
Read MoreWhy Fiber Rings Alone Aren’t Good Enough for Business Networks
Fiber optic rings are great in many ways, but they are not sufficient to give your business 100 percent uptime. Let’s take a closer look at fiber rings, resiliency, and best practices for uptime.
Read MoreThe Changing Landscape of Cyber Insurance
With the frequency and cost of ransomware attacks on the rise, cyber insurance is protection organizations really need but many business leaders don’t understand. Let’s shed some light on this topic.
Read MoreThe True Benefits of Project Management
What are the true benefits of having a project manager on your team? Hear from one JDL Technologies project manager about how she orchestrates the successful onboarding of clients and the efficient execution of projects.
Read MoreIT Security Alert: Russia-Ukraine Conflict
We are saddened by the events unfolding in Ukraine and recognize that in addition to local hardships, the conflict will pose severe cybersecurity challenges for governments and businesses in NATO nations. Several threat groups aligned with Russian interests have been identified as active against Ukraine and Eastern European targets and their reach is expected to… Read more »
Read MoreWhy You Need Two (or more) Internet Links: Dual Internet Advantages
The Internet is an essential part of most organizations’ technological infrastructure and risking a single point of failure is not an option. Dual internet connections are essential.
Read MoreWhy Data Integrity Matters in 2022
A key factor to guide leaders in making sound decisions is data. That’s why data integrity matters and here’s how to ensure it.
Read MoreLog4j – Ecessa Products Not Affected
Learn about the Log4Shell (CVE-2021-44228) vulnerability. Ecessa products do not use Java or Log4j and are NOT impacted.
Read MoreThe 3 Steps of New-School Security Awareness Training
Traditional training won’t protect you against ransomware. It takes New-School Security Awareness Training to transform your employees into a human firewall.
Read MoreUnderstanding Cybersecurity Infographic
Using an infographic, we will help you understand how different layers of cybersecurity technology work together to form a strong shield against unwanted intrusion, data theft and exploitation by criminals.
Read More