
How to Counter the Insider Threat to Stay HIPAA Compliant
One of the leading causes of security breaches in healthcare organizations is insider threat. Learn what causes insider data breaches and how to counter this threat.
Looking for resources regarding cloud, colocation, hosting, backup, and disaster recovery? Then start with the VPLS blog, where you’ll find published content from our team of industry and technical experts, free to read.
One of the leading causes of security breaches in healthcare organizations is insider threat. Learn what causes insider data breaches and how to counter this threat.
Find out how your organization can mitigate risks and respond to the SolarWinds Hack in this guide from leading cybersecurity experts.
VPLS actively serves two-thirds of the world’s time zones, with our staff in Hawaii functioning as the bridge between the mainland US and Southeast Asia.
With work/learn-from-home growing, IT staff in education face unique challenges in securing connectivity for students and faculty in their homes. In this blog post, John Headley highlights two other special concerns for IT and cybersecurity in education and his recommendations.
This major security flaw could impact nearly 200,000 currently-deployed FortiGate firewalls. Learn how to check for this vulnerability and how to resolve it.
You want to take advantage of the flexibility of a multi-cloud or hybrid cloud environment. Don’t get blindsided by configuration complexities and unpredictable network performance. Here’s how.
Having connection issues? Here are some common enterprise wifi issues that we’ve encountered and ways to resolve them.
It’s always better to be safe than sorry: read this short blog to find out 10 reasons why you need a geographically-redundant colocation strategy.
From email security to zero trust network access, John Headley recommends 10 tools to defend against ransomware.
The traditional “trust but verify” model hasn’t been able to withstand today’s cybersecurity threat landscape. Here’s how the Zero Trust Model is different.
EDR stands for Endpoint Detection & Response. Learn how EDR goes beyond what is offered by standard endpoint protection platform (EPP), i.e. traditional antivirus products.
Two of the most popular options for setting up a remote workspace are VPN and VDI. It’s important to know the differences between each option in order to select the right fit for your business.