TEC Technology Blog

Think a data breach won’t hit your business?

According to identity theft protection company IdentityForce, reported year-over-year data breaches in the U.S. increased +40% in 2016, with the largest breach in history (affecting more than one billion – yes, BILLION – Yahoo accounts) leading the way.  That trend only gained momentum in 2017, with significant quantities…

Akron Hyperconverged Data Center image

What is Hyperconvergence?

What Does It Mean for Data Center Management?
What is hyperconvergence? To understand what hyperconvergence is, it helps to understand where we’ve come from in the data center space.

The data center – or “server closet”, depending on the size of your business – used to be a room that kept…

What is a Next Generation Firewall?

By Frank Keogh
While the name, “Next Generation Firewall” sounds like one of those “hype” terms that marketers often use to get you excited about a product, this is one instance where the technology really lives up the to the name.

To understand what a Next Generation Firewall (NGFW) is, it…

What is Advanced Malware Protection (AMP)?

By Frank Keogh
As technologies evolve, fancy new names have to be created by technology vendors in order to differentiate today’s super-cool technology from yesterday’s super-cool-but-now-outdated technology.


This is the case with the label “Advanced Malware Protection”, or “AMP”.  AMP is the name given to the most current iteration of antivirus…

3 Essential Features of a Modern Enterprise Cybersecurity Solution

TEC Tech Quick Hits

In Cisco’s 2017 Annual Cybersecurity Report, Cisco’s SVP of Security, John N. Stewart, had the following to say:
“It’s really quite simple: The more attack vectors that go unnoticed and the longer we allow attackers time to exploit our systems and infrastructure, the greater their chance for…

Top 5 Damaging Ransomware Attacks

What one word can strike fear into end users, security pros, and CIOs? Ransomware. This malware has raised to infamy recently with many major-headline attacks hitting all over the world. These recent attacks don’t indicate a new form of attack, ransomware has actually been around just about as long…