Most Recent

OnX Blog

How a VPN protects your privacy

Think about all the times you’ve been on the go, reading emails while in line at the coffee shop, or checking your bank account while waiting at the doctor’s office. Unless you were logged into a private network that requires an encryption key, any data transmitted during your online session could be vulnerable to eavesdropping […]

Why Businesses Need Endpoint Protection

Endpoint protection helps businesses keep critical systems, intellectual property, customer data, employees, and guests safe from ransomware, phishing, malware, and other zero-day cyber attacks.  Why businesses need endpoint protection: Criminals are constantly developing new ways to attack networks, take advantage of employee trust, and steal data. Smaller businesses may think they’re not a target, but […]

Our current state: A perspective from our CSO during the COVID-19 crisis

Security plays an additional role in a crisis like COVID-19 in protecting an organization’s ability to respond effectively, which sometimes means accepting more risk. Security has to be laser-focused on ensuring a physical or cyber crisis does not impede the organization’s response efforts. It also needs to be a part of the ongoing risk decision-making […]

After the Smoke Clears – What can we learn about risk management

The security team has a particular responsibility in helping to answer these questions. The mission of a security team is to protect a business from risk. The risk of a pandemic eliminating supplies, services, and customers, as well as forcing employees to stay home, etc., probably was not on the radar of most businesses. It […]

OnX-Leverage-Tools-IT-Security

In response to COVID-19 now is the time to build a Cyber Risk Program – Learn how

According to IDC (Source – Worldwide CISO Influence Survey 2018), business leaders and CISOs view information security as vital to competitiveness of products and services while protecting the interests of their customers. Areas an Enterprise Cyber Risk Program should cover When an organization promises to deliver the value of digital business to customers, it’s often […]

workload migration

Now, more than ever, network infrastructures need Network Access Control

A recent example was provided by an attacker penetrating an IoT-based HVAC system that ultimately provided the attacker a nearly unrestricted path all the way to the victim corporation’s Point of Sale systems. Table of Contents: How Network Access Control works How NAC solves IoT device vulnerabilities A common misconception about modern NAC solutions NAC […]

IT solutions

The Effects of the Coronavirus on Cybersecurity

Attackers are capitalizing on our fear Cybercriminals and malware authors always try to find the most effective way to trick users into making poor, risky choices. Fear is an extremely effective mechanism, so in the last weeks we’ve seen this happen with the pandemic. Phishing attacks that purport to carry news about quarantines and lockdowns, […]

Considerations for remote work

Ensure remote and work-at-home efficiency Many global companies are embracing a “video first” strategy, emphasizing video meetings as a reliable alternative when face-to-face meetings aren’t practical or safe. Especially during times of crisis, like during the current COVID-19 outbreak, but also when in-person meetings aren’t feasible due to the location of remote offices, travel restrictions, […]

OnX IT recruiters deliver better outcomes than AI

Removing network barriers with SD-WAN to achieve your business goals

As your organization evolves in the digital era, the data and traffic employees generate will inevitably surpass the capabilities of the traditional network architecture you’ve built over the years. Although your existing WAN has served the enterprise well, with today’s increased network traffic and exponential growth in data, traditional WAN architecture has become overly complex […]

Top considerations for Coronavirus contingency planning

A robust contingency plan must address both the needs of the company and the needs of its employees and customers in a way that protects people and maintains stability and productivity. Components of an effective contingency plan A robust contingency plan must address both the needs of the company and the needs of its employees […]