Forthright Technology Partners will integrate Star2Star’s technologies into Forthright’s managed service offerings to its clients.
Webinar: Ask The End-User Computing Experts
Our latest webinar offered an interactive Q&A period for attendees, giving them access to helpful advice from EUC experts.
Google Mulling Mandatory Two-Factor Authentication For All Users
Google Mulling Mandatory Two-Factor Authentication For All Users Google plans to bolster the security of user accounts by making two-factor…
Cyber Criminals Are Actively Exploiting a WordPress Plugin Zero-Day
Cyber Criminals Are Actively Exploiting a WordPress Plugin Zero-Day The Fancy Product Designer plugin — commonly used to configure visual…
Could A Colonial Pipeline-Style Cyberattack Disrupt Your Business?
Could A Colonial Pipeline-Style Cyberattack Disrupt Your Business? The Colonial Pipeline ransomware attack garnered national headlines after hackers caused widespread…
Does Your Approach To Cybersecurity Offer Too Much Trust?
Cybersecurity is constantly evolving. Both the solutions we use to protect ourselves, and their underlying theory and strategy are under…