The Key Point Blog

08/27/2020

Keypoint Intelligence

Traditional OEMs and Dealers are Expanding Service Offerings to Remain Competitive

Until recently, security was relegated to protecting multifunctional devices and printers and the output that they produced. This blog explores the other security methods that have developed since then.

Read

08/18/2020

Keypoint Intelligence

The Controversy Surrounding TikTok and WeChat

Technology can help us to grow our businesses, educate our children, increase the speed of gathering information, and facilitating important research, but it also puts our personal information at risk. This blog explores these dangers using TikTok and WeChat as examples.

Read

08/11/2020

Keypoint Intelligence

People Can Be Your Weakest Link or Your Best Defense

Security is a combination of people, processes, and technology. While they work in concert to protect an organization’s intellectual property or sensitive information, the people component has proven to be one of the weakest links in an organization’s security posture.

Read

08/06/2020

Keypoint Intelligence

What Print Service Providers Need to Know in Today’s Regulated Business Environment

Worldwide, legislation is being established to protect people's personally identifiable information. This blog explores the attestations and accreditation that PSPs can pursue to protect themselves.

Read

06/29/2020

Jamie Bsales

Threat Grows as Employees Work from Home for the Foreseeable Future

There is a newly uncovered security vulnerability possibly lurking in hundreds of millions of Internet-capable devices sold over the past 20-some-odd years that includes printers and other IoT devices home-based employees rely on.

Read

04/30/2020

Jamie Bsales

On-Premises Servers, Devices, and Data Are Useless When No One Is There

Businesses are still far too reliant on the traditional on-premises architecture. While many companies have migrated some functions to the cloud, the COVID-19 pandemic saw plenty of IT folks scrambling to set up VPNs to allow remote access to critical applications and files that reside on-site.

Read

04/01/2020

Carl Schell

Mega Dealer Exec Discusses Making an Impact in Managed IT Services

With over 20 years of IT experience, Layton has seen it all. He started with Novell to Windows NT upgrades and segued into the dot-com bubble, after which he entered the consulting space.

Read

03/26/2020

Jamie Bsales & David Sweetnam

Your Home Printer and Network Equipment Could Be Putting Corporate Data at Risk

Recent legislation measures introduced by governments across the globe have forced businesses to take much more seriously the safeguarding of our personal data, with the threat of serious punitive fines for those who breach the rules.

Read

02/20/2020

Jamie Bsales

Testing Security from Three Vectors

There’s been no shortage of conversation around MFP and printer device security, with competing claims—and sometimes outright sniping—among major OEMs about who has which features and whose devices are more vulnerable to hackers.

Read

01/08/2020

Carl Schell

Company Founder Discusses BTA and TAG Memberships, Managed IT

Cornerstone Technologies is one of seven office equipment dealers that took the plunge in 2019 and became a TAG member, on top of already being a member of the Business Technology Association.

Read