Aaron Russo - Senior Manager for Tech Sales Data Center
Aaron Russo
Senior Manager for Tech Sales Data Center
Jeff Stork - Software Delivery Practice Manager
Jeff Stork
Senior Service Manager
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Tony Dancona - Vice President of VMware EUC
Tony Dancona
VP VMware EUC, Solutions and Services
»See All Authors


We have searched the depths of our blog to provide you with the latest IT articles on Cyber-attacks. Get Connected Today!

6 Reasons to Modernize with Intel® and Microsoft

Intel® Core™ vPro™ Processors and Microsoft Windows 10 Professional Offer a Smart Upgrade Strategy

by Dave Olivier | 06.27.17

Continuous technological change is a simple fact of business life, and anyone who opts out of “keeping up” does so at great risk by being vulnerable to new security threats, and having difficulty attracting and retaining talented employees.



Keep Your Organization Safe and Secure

Discover Best Practices for Your Security Strategy

by Stephen Nardone | 03.15.17

Cyber attacks are growing in frequency and sophistication every day. Every organization, regardless of vertical industry, or size must ask themselves, is my security strategy up to date? Our team at Connection has created a series of Security Solutions videos to help you learn how to address the security risks to your organization.

Tags:ConnectionCyber-attacksSecurity AssessmentSecurity Solutions

HP Elite X3 in Dock

A Seamless Combination of Mobility and Security

How HP Elite X3 Makes You More Efficient

by Jeff Trent | 12.27.16

Security is top of mind for everyone these days. With all the latest news of high-profile cyber attacks, it’s no wonder. Everyone needs to pay better attention to security—perhaps no one more than the federal government. And while staying secure remains a top priority, safety measures on your work machine can be counter-productive if they prevent you from working efficiently.

Tags:BIOSCyber-attacksFederal governmentHP Elite X3Mobile devicesPodcastSecuritySmartphoneTablets


Retailers' Increased Cyber Security Budgets

The New Cost of Doing Business

by Jennifer Ramstrom | 11.21.16

Like nearly every business today, retail and consumer companies are under siege from a near-constant barrage of phishing emails, SQL injections, insider attacks, and other nefarious cyber threats.

We’ve all read about the high-profile attacks—like a massive security failure in 2015 when cyber criminals accessed the personal data of up to 15 million individuals, including names, addresses, Social Security numbers, birthdates, and more.

Tags:BiometricsConnectioncyber threatsCyber-attacksITphishing emailsRetailSecuritySQL


Building Resilience in Critical Infrastructure

Reduce Your Cyber Security Risk

by Stephen Nardone | 11.02.16

Resiliency is the key to surviving after a cyberattack, especially in critical infrastructure. Having an emergency response plan will help you to prepare and respond to an incident so that your organization can return to business as usual with as little impact as possible.

Tags:Cyber SecurityCyber-attacksNational Cyber Security Awareness MonthTechnology