View Post

Ransomware by the Numbers

In Cybersecurity by Ken Nero

Ransomware continues to be Public Enemy Number One in terms of IT security concerns, representing more than 60% of all malware attacks. As the threat of Ransomware grows, organizations are under increased pressure to protect themselves and their critical data. At IKON, we take data protection seriously and want to ensure organizations like yours are armed with the facts. The following statistics …

View Post

FatPipe Unleashes New Integrated VNF/SD-WAN Offering for Enterprises

In IKON in the News, WAN by Ken Nero

*This article originally appeared on ChannelPartnersOnline.com.  FatPipe Networks has unveiled an enterprise product for SD-WAN that allows for what the company says is easy deployment of network functions virtualization (NFV). FatPipe Virtualized Network Function (VNF) integrates SD-WAN functionality with routing, firewall, security, DPI (deep packet onspection), QoS, WAN optimization and domain name system (DNS) management to allow the digital transformation of NFV. It allows enterprises and …

View Post

INFOGRAPHIC: The Growth of Technology Expenses in Education

In Education by Ken Nero

It’s no secret that technology use is increasing at a rapid place, and schools are under increased pressure to keep up. In turn, technology expenses in the education arena are growing at a faster clip each year, and it’s more important than ever for school’s to reign in their spending and keep a close eye on how their budgets are …

View Post

The Ultimate Test: Is Your School’s Current IT Services Provider Up to the Challenge

In Education by Ken Nero

Finding an honest, reliable and capable IT services provider can be tricky for any organization, and especially for schools where the stakes are high and providing the best learning environment for students is the primary objective. With increased demands for technology use in the classroom, it’s more important than ever for leaders in education to collaborate with experts who can …

View Post

Devices Hacked by Linux Malware

In Cybersecurity, Uncategorized by Ken Nero

Thousands of devices have been hacked by a Linux malware named Rakos, and while researchers have yet to see any actual malicious activity involving the botnet, they believe it could be used for powerful distributed denial-of-service (DDoS) attacks. Rakos, whose existence was brought to light in December 2016 by ESET, targets Linux systems by launching brute-force attacks via SSH. The …

View Post

iOS Security Broken with a Simple Wi-Fi Connection

In Cybersecurity, WiFi by Ken Nero

Apple CEO Tim Cook announces the new iPhone 7 during an event to announce new products, in San Francisco. The blurb for a presentation at the Black Hat Asia hacking conference this week would likely concern any iPhone owner: “The victim will only have to join the Wi-Fi network, and then the device will be compromised without any user interaction, …

View Post

Linksys Routers Attacked by Hijackers Via Flaws

In Cybersecurity, WiFi by Ken Nero

Attackers could exploit the vulnerabilities to crash routers, extract sensitive information from them or take them over The Linksys WRT3200ACM router. Two dozen Linksys router models are vulnerable to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over. The vulnerabilities were discovered by senior security consultant Tao Sauvage from …