Cisco Cognitive Collaboration, Greyson Technologies

Blog

Cisco Cognitive Collaboration Features Unveiled

I have been along for the Cisco Collaboration ride for the past…
Greyson Technologies, Cisco CloudLock

Blog

CloudLock Series: Part 1 – Permissions Contained

Hi! I'm Mike, we've just met, and I'd like full, permanent, and unmonitored access to your contacts. Don't want to give that up, huh? How about your calendar? Email? Maybe all your files?

In this 3-part series we'll discover you don't know what access your users have freely given up to that developer without a name and what to do about it.
Unified communications helping 3 people work together.

Blog

5 Ways That Unified Communications Drive Collaboration

If you want your workers and project managers to work in unison effectively, you’ll need the speed and efficiency that unified communications brings.
Enterprise collaboration with 3 people talking among one another.

Blog

What Businesses Need to Know about Enterprise Collaboration

Enterprise collaboration is becoming less of an optional tool and more of a necessity in today’s business environment. Here’s what you must know.
collaboration risks being personified by a bunch of hands grabbing each other

Blog

3 Enterprise Collaboration Risks to Avoid

Collaboration in the enterprise is critical for success. And, as with any technology, there come with it certain risks that you must take great care to avoid.
BYOD Policy with multiple devices stacked atop one another.

Blog

4 Things to Keep in Mind When Creating a Secure Enterprise BYOD Policy

Enterprises that wish to implement BYOD must take great care to create a solid policy. Here are 4 things that you should keep in mind when creating it.
IT incident response team looking at an error on a PC

Blog

The Critical Steps to IT Incident Response

It’s vital to monitor your IT infrastructure for faults and errors. Even a small nuisance can become a big problem if left unchecked.
Network monitoring starting by the cables.

Blog

Network Infrastructure Monitoring: The What and the Why

When choosing a network monitoring solution, you must choose one that offers complete visibility into the state of your network.
Little plastic man symbolizing phishing attacks.

Blog

Everything You Need to Know About Phishing Emails

What are phishing attacks? How do you stay protected against them? How can you prevent them? Keep reading to find out.
Man at a computer protecting a business from a potential data breach.

Blog

The #1 Data Breach Management Strategy

Understanding data breaches is the first step to knowing how to properly protect your organization against them.