Welcome to the Vircom Blog!

Are you Really Protected? 10 Tips on How to Layer Your Security

Are you Really Protected? 10 Tips on How to Layer Your Security

Posted on 20 July 2016 at 09:29
By: Yves Lacombe   You think you’re protected, but are you? You try to respect the best practices to keep the network safe including all the users who access it. But John just opened another support ticket indicating that he has another virus or that the virus that was on his machine yesterday was not completely removed from his system. There’s this false feeling of security...
Read More No Comments
Hey Microsoft, Where’s Your Security Performance Data?

Hey Microsoft, Where’s Your Security Performance Data?

Posted on 19 July 2016 at 09:21
By: Mike Petsalis   As a security vendor deeply embedded in the Microsoft space, we often get asked by clients and prospects to provide performance metrics against Microsoft’s own security products. While this is easy when it comes to quite-literally-every-other-security-vendor-out-there, it’s not possible with Microsoft. Email and Network Security is an industry that is built to...
Read More No Comments
5 Ways to Prep for a Stress-Free Vacation

5 Ways to Prep for a Stress-Free Vacation

Posted on 18 July 2016 at 09:05
By: Jason Carreiro   Everyone deserves a well-earned break but it can be tough sometimes to disconnect from the office, especially for IT managers and sysadmins. Preparing for a vacation is stressful at the best of times, but for people responsible for a network it is crucial to make sure everything is in order.   You want everything to run as smoothly as possible. You may be...
Read More No Comments
Did You Just Cut and Paste from a Web Page? What A Mistake!

Did You Just Cut and Paste from a Web Page? What A Mistake!

Posted on 14 July 2016 at 09:55
By: Jason Carreiro   You think it is harmless. You want to capture a snippet of code from an online tutorial for future use. You don’t want to re-type it for fear you will make a mistake. So, you decide it's faster and easier to just copy and paste. Are you aware of what could happen? Did you just make a mistake?   In the code you copied, a hacker may have hidden malicious...
Read More No Comments
Can Employees Have It All? Security Challenges with BYOD

Can Employees Have It All? Security Challenges with BYOD

Posted on 12 July 2016 at 09:04
By: Yves Lacombe More and more employees are using their personal devices at work. Bring your own device (BYOD) permits employees to use technology they know well. It allows them to be more efficient and productive in their work. It supports employees in balancing their personal and professional lives.   In a survey by Tech Pro Research, 74% of companies were using or adopting BYOD....
Read More No Comments
How to Avoid Security Threats During Your Summer Vacation

How to Avoid Security Threats During Your Summer Vacation

Posted on 07 July 2016 at 09:48
By: Jason Carreiro   Those lazy, hazy summer days are now upon us. July is here – a time when many of us take time-off from work to travel and enjoy the summer heat. We look forward to some rest and relaxation but vacation time does not mean taking a break from protecting yourself from cybercrime.   Hackers are never on vacation. If you let your guard down, this is the...
Read More No Comments
Your Summer Cybersecurity Reading List

Your Summer Cybersecurity Reading List

Posted on 05 July 2016 at 09:10
By: Mike Petsalis   Summer vacation is the best time to get some well-deserved rest, spend time with family and friends, and maybe get some repairs done around the house. It’s also a great time to catch up on some reading and learning. Here are Vircom’s recommended books on Cybersecurity for your backyard and beach reading. Enjoy!   Liars and Outliers by Bruce Schneier...
Read More No Comments
It’s Nothing Personal: Why You Should Restrict Full Admin Access

It’s Nothing Personal: Why You Should Restrict Full Admin Access

Posted on 30 June 2016 at 09:59
By: Antonio Ortiz   You’ve probably heard an employee complain about wanting admin rights to a particular system. They say they “want” access ...but do they really “need” it to do their job? Does the CIO need full admin access rights to all the production servers? Dave, the application developer, says he needs to do a low-risk, quick fix in production. With tight deadlines...
Read More No Comments
3 Critical Steps to Setup SPF for your Business Email to Avoid Spoofing and Phishing Attacks

3 Critical Steps to Setup SPF for your Business Email to Avoid Spoofing and Phishing Attacks

Posted on 28 June 2016 at 09:13
By: Yves Lacombe   I’m assuming you already know what SPF (Sender Policy Framework) is and know how it is important enough for you to set it up properly.  If you don’t, then I suggest you read this article.   Step 1 - Identify all the places sending email on your behalf   Internal Systems: •   Any mail server(s) you may be running that will be sending mail...
Read More No Comments
7 Tips to Ensure your Data Center is Ready to Beat the Summer Heat!

7 Tips to Ensure your Data Center is Ready to Beat the Summer Heat!

Posted on 23 June 2016 at 09:24
By: Yves Lacombe   After a long winter, many of us yearn for those hot summer days where we can laze around on a beach or take a dip in the pool. But summer means something completely different to data center managers. They have to keep an eye on the heat outside and how it will affect their operations.   There are some simple changes that can be made within a data center to...
Read More No Comments

Questions? Call us.

Speak with Security Expert Engineers to learn more about how Vircom can help your Business IT Security.

1-888-484-7266

Request a demo.

Schedule a demo to talk to a Security Expert Engineer about your specific needs.

Request a demo

Start a free trial.

Test drive the full Vircom experience, free for 30-days. Get started today!

Start a trial

Free Trial Free Email Security Grader