Is Cybercrime increasing or decreasing: 5 disturbing statistics from remote workers

Have you ever considered how the rush to set up remote workers has impacted network security?  Are we now more secure or less secure?  What did we gain, or possibly miss in terms of vulnerability?  Consider the following….Microsoft reported 32 million subscribers using Teams on March 11th, a 40% increase. Most business only dream of…

What is SD-WAN?

More and more organizations are turning away from branch routers in favor of Secure SD-WAN to become cloud-ready. What is SD-WAN? If your organization is like most others then you probably have moved many of your core systems to the cloud. Practice management solutions, CRM solutions, ERP solutions, most software vendors are moving their clients…

How COVID 19 Changed the way we Communicate

Its amazing how so much has changed in such a short time. Within a matter of days, we went from working in our offices to working from home. We went from face‑to‑face meetings to web conferencing from our kitchen tables. From picking up the office line to picking up our smartphones to get calls on…

Most Secure Video Conferencing Tools

As companies and individuals continue the transition to online lessons and meetings, the FBI recommends exercising due diligence and caution in your cybersecurity efforts. But do you know if a video platform is secure? The defacto standard term for video during this epidemic has been Zoom. However Zoom has been in the news for its…

Small Business WAN Best Practices

Today networks are critical to the operation and innovation of business organizations, workforce productivity is built on the expectation of nonstop access to communications and resources. The primary role of the WAN is to interconnect primary site and remote-site LANs. As networks become more complex in order to meet the needs of any device, any…

The Biggest Vulnerabilities in your Business Network

There’s a common saying in the world of cybersecurity: It’s not a matter of “if,” but “when” a security incident will rear its ugly head. Businesses constantly have to deal with phishing, malware, insider threats, and newly discovered vulnerabilities. To reduce risk and adequately protect against cyber threats, organizations need to employ a multi-layered security…

Adaptive Network Security

Today’s network-enabled organizations rely on the internet for mission-critical connections to employees, partners and customers. A more mobile workforce and bring-your-own-device (BYOD) policies are expanding the security perimeter – introducing heightened levels of risk. With so many enterprises migrating to hybrid wide area network (WAN) architectures, their data, applications and systems are more exposed than…

What can Agility Communications help you with?

We’ve been in this business for over 20 years and it still surprises me when I’m talking to a client and they mention we just implemented a security solution or we just moved to Office365 etc and I’m thinking, why didn’t you call me? Inevitably the answer is always “I didn’t you know you guys…