Skip to content
IAUG Insider
IAUG Insider
A blog about IAUG
  • Blog
  • IAUG Home

Tag: Security

Defending Against Ransomware Attacks

August 24, 2021 Richard Westlund Leave a comment

A ransomware attack is a nightmare scenario for IT professionals and their organizations. Along with the costs of recovering data…

Continue Reading →

Posted in: Business Strategies Filed under: Security

Addressing Email Security Threats

June 2, 2021 Richard Westlund Leave a comment

Effective email security is one of the best ways to prevent costly ransomware attacks, data breaches and wire fraud.  Cyber…

Continue Reading →

Posted in: Business Strategies Filed under: Cybersecurity, Security

How to Show the Value of Cybersecurity Investments

April 20, 2021 Richard Westlund 1 Comment

It can be easy to measure the financial impact of IT investments that reduce hardware, licensing, trunking or labor costs.…

Continue Reading →

Posted in: Business Strategies, Leadership Filed under: Professional Development, Security

Exploring Security Needs for Cloud Solutions

March 16, 2021 Richard Westlund Leave a comment

Moving your communications platform to the cloud can solve a number of cybersecurity issues. You don’t have to worry about…

Continue Reading →

Posted in: Business Strategies Filed under: Cloud, Security

How the COVID Crisis Shifted UC&C Priorities

December 1, 2020 Richard Westlund 1 Comment

For enterprise IT professionals, the COVID-19 crisis created opportunities as well as challenges.  In many cases, it accelerated the deployment…

Continue Reading →

Posted in: Business Strategies Filed under: Security

Best Practices to Improve UC&C Security

November 24, 2020 Richard Westlund Leave a comment

Have you confirmed the identity of everyone participating in your virtual conference session?  If you are transcribing or recording the…

Continue Reading →

Posted in: Business Strategies Filed under: Security

Best Practices to Improve UC&C Security

September 30, 2020 Richard Westlund Leave a comment

Have you confirmed the identity of everyone participating in your virtual conference session?  If you are transcribing or recording the…

Continue Reading →

Posted in: Business Strategies Filed under: Security
Copyright © 2025 IAUG Insider