Mass Notification & Emergency Notification Software

SupportTraining

Blog

Notification Blog

Mar 23
2017
The cybersecurity principle of the locked door

The cybersecurity principle of the locked door

You lock your home—now lock your network. This means having a reliable and secure data center and following basic safety rules, like locking down ports, shutting off services, removing rights and privileges when no longer justified, and using firewalls. You’ll also need host and network intrusion detection and prevention (IDS/IPS) as well as physical access controls such as badge, PIN pad and biometrics etc., to ensure you let only the right traffic and... Read More »

Mar 16
2017
Cybersecurity principle #3: Beware the shiny and new

Cybersecurity principle #3: Beware the shiny and new

This post is short and sweet, but very important. Most of us are drawn to new tech toys, but at the same time, we resist change. We want the latest and greatest, and yet a part of us resists the added security responsibility that comes with new technology. This is something we need to be very aware of in the cybersecurity sphere. The shiny, new rules are basic: If you installed it, update... Read More »

Mar 9
2017
Making the case for automated notification in IT

Making the case for automated notification in IT

Everyone from the CEO to the mail room wants the same thing from IT—quality services, delivered reliably. More and more that means that IT operations must rely on automated tools to support ITSM processes within the organization. Let’s take a look at making the case for a robust, flexible and full-featured automated notification tool to increase efficiency. Why automated notification? Some of the most prevalent tools help with incident tickets, helpdesk issues, and... Read More »

Mar 2
2017
Cybersecurity: Defense is the best defense

Cybersecurity: Defense is the best defense

You defend your home, you defend your car, and it’s important you do the same for your network and all the resources it encompasses. How to defend your network? The most basic defensive tools include anti-virus and anti-malware software, which should be present on any device that can be connected to the Internet. This means on your company assets as well as those introduced by staff (this means a careful review of your... Read More »