Select Page
Deadline Nears for Skype-to-Teams Transition

Deadline Nears for Skype-to-Teams Transition

Touted as the future of enterprise communication and collaboration when it was introduced by Microsoft in 2015, Skype for Business Online will be retired for good on July 31. After that date, it will no longer be available and integration with third-party audio...
Using Desk Hoteling to Build a Flexible Workspace

Using Desk Hoteling to Build a Flexible Workspace

Remote work has been so successful that most organizations plan to permanently support hybrid workstyles that allow employees to split time between home and the office. That’s easier said than done, however. Businesses can’t afford to keep paying rent on office spaces...
Cisco Webex Enhancements Help Combat Meeting Fatigue

Cisco Webex Enhancements Help Combat Meeting Fatigue

Video collaboration solutions have been instrumental in enabling remote work, but “meeting fatigue” is a legitimate downside to the technology. New research published by the American Psychological Association finds that meeting via computer instead of in person “can...
Breaking the Ransomware Kill Chain

Breaking the Ransomware Kill Chain

The pandemic has been great for business — if you’re in the ransomware business. Ransomware criminals tripled their income in 2020, collecting at least $350 million in ransom payments according to a new report from firm Chainalysis. The company notes that the actual...
Building a Better SIEM with Automation & Analytics

Building a Better SIEM with Automation & Analytics

IT security professionals have a love-hate relationship with security information and event management (SIEM) systems. While most consider SIEM to be an invaluable element of modern network security, they also find the systems to be costly, complex and confusing. SIEM...
What to Do After a Negative Pen Test

What to Do After a Negative Pen Test

Penetration tests, or pen tests, are ethical hacking exercises in which security professionals, like Cerium Networks, launch simulated attacks on your computer systems to assess your overall security posture. There’s no need to panic if you get a negative test result,...
Shadow IT: How to Reduce Risk and Reap Rewards

Shadow IT: How to Reduce Risk and Reap Rewards

The pandemic-driven shift to remote work has revived anxiety about shadow IT. Lacking many of the technology tools they used in the workplace, home-bound employees were quick to turn to cloud-based applications and services — often without the knowledge or permission...
Secure and Control Microsoft 365 Data with Veeam

Secure and Control Microsoft 365 Data with Veeam

With nearly 300 million active monthly users, Microsoft 365 is the fastest-growing product in Microsoft’s history — and there’s no sign growth will slow anytime soon. By providing online access to business-critical applications including Word, Excel, PowerPoint, Teams...
For Emergency Support call: (877) 423-7486
For other support requests or to access your Cerium 1463° portal click here