The Key Point Blog

09/21/2022

Keith Haas

Is your business protected from cyberattacks?

The conveniences that Internet-connected devices add to the lives of tech-savvy individuals and business professionals is welcome across the board, but having such interconnectivity comes with cybersecurity risks.

Read

09/19/2022

Carl Schell

Revealing the final eight large-scale technology providers on the list

It’s a products and services world, and the mega dealers are acing the test. Sure, they have the human resources and the capital to make things happen on a grand scale—or to make new revenue streams happen.

Read

09/12/2022

Carl Schell

Which large-scale technology providers are on the list?

The mega dealers are “mega” because they are a well-diversified bunch. Sure, success is evident simply by studying financials for a few minutes, yet each company has its own story on how they surpassed $100M in annual revenue—and then some.

Read

09/08/2022

Jamie Bsales

More join the elite group of OEMs that have passed our rigorous penetration testing

Keypoint Intelligence is happy to announce that several more OEMs have passed the evaluation and earned our BLI Security Validation Testing seal for Device Penetration.

Read

08/17/2022

Carl Schell

Impact Networking’s educational event on managed IT services and how work gets done today

Impact Networking and IT have gone hand in hand for a while now. The show aims to address how best to fill the gap between business and technology as well as how to educate existing Impact Networking customers and its potential clients on the benefits, trends, and the future of IT.

Read

08/11/2022

Mark DiMattei

Introducing new parental security measures to protect teens online

Social media may feel like it's been a part of our lives for forever, but we are still working out how everyone can use it safely. We discuss here how certain social media apps are enacting safety controls for teens as well as the dangers that younger users can face.

Read

08/05/2022

Keypoint Intelligence

Reinforcing the trust in remote voting is paramount

While the use of mail-in ballots exploded during the COVID-19 pandemic, the politicization of absentee voting caused a lot of distrust in the process. We discuss here some of the history of mail-in voting as well as the results of our recent LinkedIn poll.

Read

07/05/2022

Jamie Bsales

Looking the latest cyber threats and how to combat them

Sponsored by ConnectWise, the leading vendor focused on managed IT services providers, the IT Nation Secure event focused on cybersecurity for several audiences. We discuss here the highlights of the event as well as some of the challenges facing cybersecurity professionals today.

Read

06/13/2022

Carl Schell

Company continues transformation through products, services, positive energy, and honesty

Creating a sense of closeness at a big, in-person event can be difficult to pull off. Fortunately for Oscar Sanchez and everyone else at KYOCERA Document Solutions America who was involved with its most recent dealer meeting, they did so with relative ease.

Read

06/06/2022

David Sweetnam

A look into the newer, shinier hacker of our digital landscape

Cybersecurity is an ever-growing issue in our highly digital world, one that is becoming far more refined than the days of suspicious looking e-mail links.

Read