The Key Point Blog

05/05/2021

Carl Schell

Directions in managed IT and the cloud

For IT vendors, MSPs, and, yes, those office equipment dealers that have an IT practice, there has been no downtime in developing as well as selling products and services to help customers thrive during the pandemic.

Read

04/26/2021

Jamie Bsales

New data indicates attacks by state-sponsored hackers have doubled in the last three years

The report shows that almost 30% of the cyber threats captured by the HP threat team were previously unknown, as attackers increase their use of smokescreen techniques to evade detection tools.

Read

03/25/2021

Jamie Bsales

Understanding the security threat printers pose and recommendations on how to mitigate vulnerabilities

Followers have heard us mention time and again the security threats that Internet-connected printers and MFPs can pose to a home or corporate network. This blog explores some of the solutions Keypoint Intelligence has found to combat these threats.

Read

10/29/2020

Keypoint Intelligence

This week’s theme: “The Future of Connected Devices”

In the fifth and final blog of our NCSAM series, we explore the future of cybersecurity through expert opinion and outside studies.

Read

10/22/2020

Keypoint Intelligence

This week’s theme: “Securing Internet-Connected Devices in Healthcare”

The theme for this week's cybersecurity blog is specific to securing devices in healthcare. We explore common vulnerabilities and opportunities for protective measures.

Read

10/14/2020

Keypoint Intelligence

This week’s theme: “Securing Devices at Home and Work”

Any cybersecurity professional will tell you there is no way to be 100% secure, but there is a short list of things that you can do to hedge your chances of mitigating a risk. This week's NCSAM blog explores the ways to be as safe as possible.

Read

10/07/2020

Keypoint Intelligence

This week’s theme: “If You Connect It, Protect It”

For the first week of NCSAM, this blog explores the unknown dangers of smart devices and provides the National Cybersecurity Alliance's "commonsense checklist" of solutions to overcome common weak points.

Read

10/02/2020

Jamie Bsales

Expands successful “bug bounty” program to office-class HP Original Ink and Toner cartridges

HP is expanding its "bug bounty" program to ink and toner cartridges. The company is challenging four professional ethical hackers to identify security vulnerabilities and risks that might be lurking in the firmware found in office-class HP Original Ink and Toner cartridges.

Read

10/01/2020

Keypoint Intelligence

The 2020 theme: “Do Your Part. #BeCyberSmart”

In its 17th year, the CISA National Cybersecurity Awareness Month (NCSAM) continues to raise awareness about the importance of cybersecurity in the US. This blog kicks off our series on the topics covered during this year's NCSAM.

Read

08/27/2020

Keypoint Intelligence

Traditional OEMs and Dealers are Expanding Service Offerings to Remain Competitive

Until recently, security was relegated to protecting multifunctional devices and printers and the output that they produced. This blog explores the other security methods that have developed since then.

Read