Aaron Russo - Senior Manager for Tech Sales Data Center
Aaron Russo
Senior Manager for Tech Sales Data Center
Jeff Stork - Software Delivery Practice Manager
Jeff Stork
Senior Service Manager
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Tony Dancona - Vice President of VMware EUC
Tony Dancona
VP VMware EUC, Solutions and Services
»See All Authors


We have searched the depths of our blog to provide you with the latest IT articles on Malware. Get Connected Today!
Mobile Device Security

Users Hold the Keys to Better Mobile Security

Common User Misperceptions About the Security of Mobile Devices

by Stephen Nardone | 10.24.16

According to IDC’s Mobile Security Predictions for 2015, users are a key element of security. With the number of mobile users having surpassed the number of desktop users, securing these devices is greater challenge.

Tags:Cyber AwarenessMalwareMobile devicesNetworkSecurityTechnology

Cyber Security

Stop. Think. Connect.

And Protect!

by Stephen Nardone | 10.03.16

This October is once again National Cyber Security Awareness month and also the sixth anniversary of “Stop. Think. Connect.” the national cybersecurity education and awareness campaign. While targeted at the general public, the campaign is of equal—if not greater—relevance to IT and InfoSec pros.

Tags:BYODConnectionCyber AwarenessCybersecurityDevicesInternetITMalwareMobilityNational Cyber Security Awareness MonthSoftwareSymantec

Cybersecurity Best Practices

Best Practices to Improve Cybersecurity

They May Be Simpler than You Think

by Stephen Nardone | 07.06.16

The threat environment—i.e. malware and zero-day attacks, drive-by downloads, watering hole attacks, and denial and distributed denial of service (DoS/DDoS) attacks—is worsening, and the news and analyses paint a dismal picture for cybersecurity: it’s not a case of if you’ll be attacked, but when. However, making your environment more secure—and if not eliminating, at least drastically reducing your risk—is achievable by implementing the appropriate policies, practices and technologies.

Tags:BYODCybersecurityDoSHIPAAHITECHIDCMalwareNetwork VirtualizationPCISDNSecurity breachesSecurity SolutionsSecurity-Policies

Security Survey

What Did Our Security Survey Reveal?

IT security risks and challenges - keeping your peers up at night

by Stephen Nardone | 03.22.16

Connection recently partnered with industry-leading technology research organization IDG to learn more about today’s top security trends and challenges. In an industry where the situation can change on an almost daily basis, keeping up with the latest security developments is paramount. That’s why we asked IT decision makers from organizations across the country (and a wide variety of industries) what their biggest security concerns are.

Tags:ConnectionData CenterHardwareIDCITMalwareMobile devicesNetworkSecurity trendsSoftware

Healthcare IT

It’s increasingly common to hear about a healthcare organization that has been a victim of a cyber attack or discovers a massive data breach, putting their patient’s personal health information at risk.  Health data is extremely valuable, making the healthcare industry a popular target and exposing facilities to constant attacks.  As a result, cyber security is one of the highest priorities today for healthcare organizations and IT departments and the threat landscape is constantly changing.

Tags:ConnectionCyber SecurityCyber-attacksFortinet Security SolutionsHealthcare ITMalwareSecuritySoftware