VLCM Blogs

IT Security, Cybersecurity

2FA, JUST DO IT!

The number of credential harvesting breaches that could have been prevented by enabling two-factor...

IT Information, IT Security, Cybersecurity, Managed IT, Managed Services

What to Ask When Considering Managed Security Services

You’ve come to an important crossroads. You’ve got a business worth protecting, you know cyber...

UTM, Cybersecurity, Firewall

FOR SMBS, UTM VISIBILITY IS BETTER IN THE CLOUD

Cyber attacks are growing in quantity and sophistication while virtualized environments are more...

IT Information, Cybersecurity, Firewall

3 REASONS FORTINET ENTERPRISE FIREWALL LEADS IN GARTNER’S MAGIC QUADRANT

Cyber attacks are growing in quantity and sophistication while virtualized environments are more...

Ransomware, Cybersecurity, education, K-12

BACK-TO-SCHOOL RANSOMWARE PROTECTION IN 5 STEPS

The recent WannaCry and NotPetya attacks have highlighted not only how quickly ransomware actors...

IT Information, IT Security, Cybersecurity

BE PROACTIVE THROUGHOUT THE CYBER KILL CHAIN

Too often, a company’s approach to cyber security is reactive, with the IT support team focusing on...

UTM, Cybersecurity, Firewall

FORTINET UTM NAMED GARTNER MAGIC QUADRANT “LEADER,” 8 YEARS RUNNING

IT research and advisory firm Gartner Inc. has named Fortinet’s Unified Threat Management (UTM)...