CONCERTIUM BLOG
The case for cloud-hosted virtual desktops
Cloud-Hosted Virtual Desktops are part of a cutting-edge technology approach that presents companies with many advantages in terms of cost, speed, sustainability, and more — but particularly in the critical area of cybersecurity. But first, what is a Cloud-Hosted...
Cyber security concerns for networks with mobile devices
For businesses, maintaining mobile device cybersecurity involves a holistic, strategic approach that goes well beyond protection for the compact pieces of equipment we might think of first, like cell phones, tablets and personal digital assistants (PDAs). It also...
Cybersecurity roles for board members
Cyber-threats and data breaches can cause major disruptions to large and small companies. Today, businesses are being forced to adapt. What used to be the standard — relying on modern firewalls and insulating key corporate functions — has given way to a far more...
Don’t do this! Cybersecurity tips
Electronic scams — including those propagated by email or websites — can cause major headaches (or worse) for companies and individuals. Especially during the holidays, there seems to be an uptick in scammers attempting to prey on the increase of online payments. For...