The Key Point Blog

08/03/2021

Christine Dunne

Make sure you understand the top risks and follow best practices

Information security is a top priority in many companies, reinforced by the COVID-19 crisis and expansion of work into home environments. This infographic blog presents key data from a recent Keypoint Intelligence report.

Read

07/29/2021

Carl Schell

Industry veteran discusses his vision for product testing and market research organization

Introduced as President and CEO at the beginning of July, Sci has had a potpourri experience in his 30-plus years in the industry. From a services organization (IKON) to manufacturers (Sharp and Xerox) to a dealer (LDI Color ToolBox), he has seen a ton and lived through even more.

Read

06/29/2021

Lee Davis

For OE dealers, partnering is a great way to launch a cybersecurity practice

In an increasingly digital world, businesses need to be able to protect themselves from becoming the next cybercrime victim, and customers are increasingly interested in their cyber safety.

Read

05/12/2021

Jamie Bsales

Product suite combines secure PCs and printers with an “expansive set” of software and services

The thinking behind HP Wolf Security is to integrate an array of HP’s class-leading security technologies and offerings to relieve some of the burden currently falling on customers’ IT personnel.

Read

05/05/2021

Carl Schell

Directions in managed IT and the cloud

For IT vendors, MSPs, and, yes, those office equipment dealers that have an IT practice, there has been no downtime in developing as well as selling products and services to help customers thrive during the pandemic.

Read

04/26/2021

Jamie Bsales

New data indicates attacks by state-sponsored hackers have doubled in the last three years

The report shows that almost 30% of the cyber threats captured by the HP threat team were previously unknown, as attackers increase their use of smokescreen techniques to evade detection tools.

Read

03/25/2021

Jamie Bsales

Understanding the security threat printers pose and recommendations on how to mitigate vulnerabilities

Followers have heard us mention time and again the security threats that Internet-connected printers and MFPs can pose to a home or corporate network. This blog explores some of the solutions Keypoint Intelligence has found to combat these threats.

Read

10/29/2020

Keypoint Intelligence

This week’s theme: “The Future of Connected Devices”

In the fifth and final blog of our NCSAM series, we explore the future of cybersecurity through expert opinion and outside studies.

Read

10/22/2020

Keypoint Intelligence

This week’s theme: “Securing Internet-Connected Devices in Healthcare”

The theme for this week's cybersecurity blog is specific to securing devices in healthcare. We explore common vulnerabilities and opportunities for protective measures.

Read

10/14/2020

Keypoint Intelligence

This week’s theme: “Securing Devices at Home and Work”

Any cybersecurity professional will tell you there is no way to be 100% secure, but there is a short list of things that you can do to hedge your chances of mitigating a risk. This week's NCSAM blog explores the ways to be as safe as possible.

Read