• Security

Rose de Fremery December 19, 2016 4 Minute Read

Boost IoT security when wearables come to work

Are wearables popping up at your office? Although boring legalese involved in IoT security guidelines can induce eye-glazing in some intrepid IT managers out t…

Tektonika Staff May 2, 2016 3 Minute Read

The network apocalypse, Part 2: Responding to an IT network attack

What are the first steps you should take after an IT network attack? These tips will help you mitigate the damage and get back on track.

Tektonika Staff May 2, 2016 4 Minute Read

The network apocalypse, Part 1: Recognizing an IT network attack

What are the signs of an IT network attack? Your printers may hold the clues.

Tektonika Staff April 28, 2016 4 Minute Read

4 cybersecurity threats that wrecked businesses in 2015

The mounting tech security risks have businesses across sizes and sectors scrambling to defend themselves against the top cybersecurity threats of 2015.

Carrie Dagenhard April 28, 2016 3 Minute Read

Are you a victim of counterfeit toner?

Are you accidentally buying counterfeit toner? Discover the dangerous consequences, telltale signs, and how to avoid investing in fake product.

Jasmine W. Gordon April 27, 2016 4 Minute Read

5 security risks to think about before upgrading hardware

Upgrading hardware can put your company at risk in more ways than one. When disposing of an old printer, make sure your information is safe.

Tektonika Staff April 27, 2016 4 Minute Read

Bug bounty programs bring hackers out of the shadows

Tech giants and even the U.S. government are deploying bug bounty programs and white hat hackers to uncover vulnerabilities that lead to network hacking.