View Post

6 Steps to Navigating the E-Rate Application Process

In E-Rate, Uncategorized by Ken Nero

From Competitive Bidding to Invoicing The E-Rate program, established to bridge the digital divide in education, provides funding for eligible schools, libraries, and other institutions to acquire essential telecommunications and internet services. This program operates through a structured application process that encompasses six key steps: Competitive Bidding, Selecting a Service Provider, Applying for Discounts, Application Review, Starting Services, and Invoicing. …

View Post

IKON Announces ISP SNIFF Service

In Uncategorized by Ken Nero

The team at IKON is pleased to announce our ISP SNIFF Service. IKON’s ISP SNIFF Service allows us to search for Internet Service Providers in your areas and request a bid for services based on your school’s specific needs and selection criteria. We offer this service free of charge to K-12 schools. In addition, we will help you determine which …

View Post

Devices Hacked by Linux Malware

In Cybersecurity, Uncategorized by Ken Nero

Thousands of devices have been hacked by a Linux malware named Rakos, and while researchers have yet to see any actual malicious activity involving the botnet, they believe it could be used for powerful distributed denial-of-service (DDoS) attacks. Rakos, whose existence was brought to light in December 2016 by ESET, targets Linux systems by launching brute-force attacks via SSH. The …