TBI Blog

TBI Blog

Recent Posts

The FBI reports a 300-400% increase in cybersecurity incidents since the pandemic began and Google reveals 18 million COVID-related phishing emails are now being blocked, daily. Risks and threats have rapidly multiplied as hackers prey on disenfranchised organizations and unplanned remote work. Most businesses today have security baked into their IT plans, but those plans need to be re-evaluated and assessed on an ongoing basis.

Continue reading

As many people practice social distancing and in some cases isolation, technology has proven our greatest ally, keeping us connected person to person and business to consumer. Before the pandemic, people were already engaging with companies across multiple channels, by voice, text, chat, video, and social media, growing accustomed to choosing how we want to engage and getting a quick response. Now, as people are dispersed and businesses shut down, albeit temporary, these multi-channel communications have become vital. Companies and organizations have been resourceful during these uncertain times, exploring new outlets, some even changing business models as they move quickly to communicate in real-time with customers, employees and associates.

Continue reading

The response and urgency with which we all had to react to COVID-19 came on quickly. Suddenly, we found ourselves having to ramp up an offsite workforce, testing company productivity, IT teams and infrastructure. While some had remote employees or work from home policies, a completely remote workforce and IT infrastructure operating out of office was not a fully baked plan for most.

Continue reading

When cybersecurity events occur, they can have major - even devastating - effects on your customer’s business. Preparedness and prevention are key, but the number of protections and cybersecurity recommendations can be overwhelming. Where should your customer start? What if an attack or threat still happens, what do they do?

TBI’s Tech Gurus put together a simple step-by-step cybersecurity events plan to address each phase within an occurrence – prepare, defend, recover. Get a straightforward outline of recommended actions and specific solutions to address what is happening at each level, from protecting and detecting to responding and remedying. Have a handy shortlist of what solutions are best.

Download the Cybersecurity Events document for a quick reference guide to protect customers from cybersecurity occurrences.

Continue reading

This is the final post in a three-part series where we’re taking a closer look at various cloud-related solutions, what’s trending, and partner expectations as we head into 2020.

By 2020, the number of connected devices across all technologies will reach nearly 21 billion. -Gartner

Continue reading

This is the second in a three-part series that will run monthly through the end of the year where we’ll be taking a close look at various cloud-related solutions, what’s trending, and partner expectations as we head into 2020.

It’s common knowledge that cyberattacks are increasing in frequency every year, and companies of all sizes are continuing their migration to the cloud at a record-setting pace; as a result, while these are not a new phenomenon, both cloud accounts and credentials have become the primary targets for black hat hackers.

Continue reading

By: Chris Betz, Chief Security Officer, CenturyLink

Let me put it another way: Security can be complex. The true art is making security easy to use.

As a Fortune 150 company and the second largest U.S. communications provider to global enterprise customers, we are responsible for securing our own operations through a suite of hybrid IT, cloud, networking and communications solutions — in addition to those of our customers. As CSO for this company, I can attest to the fact that the pressures security leaders face today are many.

Continue reading

We’re excited to collaborate with our new and existing TBI members to offer the opportunity to sell a blended portfolio of Verizon wireline and wireless business solutions. With over 25 million Small Business customer prospects, we have tremendous opportunity to leverage the scale and expertise of the channel to meet customers where they want to buy.

Continue reading

This article was originally published on PR Newswire.

NEW YORKJune 6, 2019 /PRNewswire/ -- Brosnan Security, the renowned national security officer firm, has unveiled its newest SmartTruck, transformed by MetTel IoT into a connected mobile command center capable of instant internal and external threat and efficiency detection, analysis and response.  Brosnan is rolling out the new SmartTrucks to big box retail store parking lots nationwide through 2019.

Continue reading

Is your organization prepared? Is your security maturity advancing? Are you concerned with meeting compliance privacy regulations? At AT&T, we help organizations minimize risks, manage security operations effectively and work toward meeting compliance requirements.

Continue reading

No matter what type of business your company conducts, even if it is technology-based, your business can benefit from an outside set of eyes. The technology and data surrounding cybersecurity are constantly changing and evolving. This means that while you may have some of the most brilliant tech minds around grinding out your code, their focus is not necessarily security -- and the result is vulnerability.

Continue reading

It’s interesting to note that device loss accounts for 41% of breaches, compared with 25% that derived from hacking and malware, according to Trend Micro. Overall, there has been a 300% increase in mobile device OS vulnerabilities since 2011, and businesses are realizing the increasingly critical need to protect company—and customer data. As networking environments have evolved, IT departments have adapted to growing security threats in mobile devices. Cabir, the first virus that infected smartphones, reared its ugly head in 2004, and by the time iPhones and other smartphones emerged, a whole new generation of security woes had been born.

Continue reading

This article was originally published on Mitel's Blog.

Whether you work in a multi-hospital healthcare system or a private dentist’s office, protecting personal health information (PHI) is essential. HIPAA’s rules and requirements are clear — no matter what, PHI must be kept completely confidential.

Continue reading

The 2018 State of Infrastructure Report from Interop ITX and InformationWeek revealed that network security is the mainspring for future network investments.  

Continue reading

TBI is committed to providing our partners with valuable information that helps drive sales and grow their businesses. We surveyed hundreds of customers from several of our large partners, asking them about their current technology and future needs. We talked about everything from their technology assessment cycle to their disaster recovery plans.

Continue reading

Software Defined Secure Branch is a purpose built solution designed for businesses and organizations with complex multi-location IT management needs and the desire for more visibility, security protection, and control of their network. Once in place, it helps keep the network secure and accessible through a combination of simplified management, the intuitive software defined wide area network (SD-WAN) solution, and security.

Continue reading

It’s apparent that U.S. organizations have accepted that cloud is here to stay; A recent analysis from Maverick Research found that more than 80% of CIOs estimate that more than half of their business will be conducted on cloud infrastructure by 2020, and roughly the same number predicted that applications supported by a SaaS platform will support more than half of their business transactions.

Continue reading

As you discuss security plans with your customers, taking a layered approach is the best way to achieve a sound security strategy. Download our solutions sheet to understand internal, external and 3rd party security solutions that you can offer to your customers today.

Download the guide. 

Continue reading

Unified communications as a Service (UCaaS) delivers a wealth of advantages in productivity and collaboration by integrating voice, chat, video/audio conferencing, faxing, and email. These benefits, though, come with several security challenges and often include mandatory industry standards that must be adhered to. 

Continue reading

TBI’s Associate Design Engineer, Zach Renkert, takes you through Cisco Meraki's cloud managed wireless and switching infrastructure including: MS220-8P Switch, MR30H Wireless Access Point, MR33 Wireless Access Point.

Continue reading
Page 1 of 3
1 2 3
>