A recent article posted on LinkedIn stated that phishing testing was not effective and could cause dissatisfaction with end-users. The writer’s solution was to stop phishing entirely and just use an e-mail content filter. For those of you who been around security … Read more
We made the coveted list again this year. Thank you to our valued customers and excellent partner community for helping us to achieve this honor. Check it out here!
By David Tumlin A question that many network and security architects ask is this… “Should you deploy point solutions (often called “Best of Breed”) that perform a single function extremely well, or a suite of integrated products that perform the needed functions … Read more
An article for security professionals. Written by: Mark J. Baudot, CISSP We are often our own worst adversary. We sometimes allow for distractions and often make exceptions that cause us to de-prioritize security team mission objectives. As a result, during these … Read more
Several organizations are whirling to remote work enablement models at an uncommon scale. As organizations navigate through this unchartered territory, corporate and government organizations in the US have recently rolled out Business Continuity plans which includes robust and scalable REMOTE ACCESS VPNs. … Read more
March 18, 2020 Dear Valued Customer, As the uncertainty grows during these unprecedented times, we at Future Com are taking measures to ensure that our employees’ health is our top priority. In closely following the information coming from organizations like the … Read more
March 13, 2020 Partnering with KnowBe4 has been extremely valuable for our business and our clients. Transacting was simple and easy, with a quick turnaround from quote to sale and true multi-tenancy for MSSPs. The product is solid, with features our … Read more
By: David Tumlin You are a network security professional. You have ensured that all your clients have endpoint protection, and that the network has firewalls and IPS. Your solutions employ sandboxing and machine learning. You’ve covered all the vectors. How are … Read more