WHY IT’S IMPORTANT TO DO THINGS THAT SCARE YOU

Marc Johnson – Marketing Assistant Over the past year, there have been so many instances where I’ve been forcefully taken out of my comfort zone. Primarily in my professional life. What is it that I do, you ask? I work in the terrifying world of MARKETING… (woooooooo). Okay, it’s not that scary when you compare…

Read More

THE iSECURE STORY THAT ALMOST WASN’T

Andrea Vink – Operations Manager I started working for iSECURE (VocalNet) in January 2010.  At the time, I was hired to do the accounting for the business.  VocalNet offered services such as Dial-Up (yes Dial-Up), internet, web hosting, VOIP etc. At the time we were just getting our feet wet with this thing called Internet Security. …

Read More

HOW ABOUT KIDS THESE DAYS?

Kevin Wilkins – Chief Technology Officer iSECURE was pleased to host a group of High School students from the Edison Career and Technology High School, part of the Rochester City School District.  They were here for a “Job Shadowing Day.”  These students were part of the P-TECH (Pathways to Technology) program, which is a STEM…

Read More

DO UNTO YOUR CUSTOMERS, AS YOU WOULD HAVE DONE UNTO YOU

Donna Smith – Director of Marketing Do Unto Your Customers, As You Would Have Done Unto You One of the best things you can do as a Marketing or Sales person is to put yourself in the prospective buyer’s shoes. However, this is more than just speculating their purchasing habits and what would most quickly…

Read More

I REMEMBER MY FIRST TIME… (MY FIRST MALWARE EXPERIENCE)

Joe Milliken, Sales Manager  I Remember My First Time… (My First Malware Experience) With the recent increase in ransomware attacks, I can’t help but to think back to my first experience with malware, about 15 years ago, with the lovely and talented Anna Kournikova*. I’m a pretty big tennis fan and I had just the…

Read More

ROLL YOUR OWN AV SIGNATURES

Kevin Wilkins CISSP – CTO iSecure LLC Roll Your Own AV Signatures There have been a lot of changes in AV and Host-Based Security in the past few years. It has become clear that there are many more instances of malware produced from day-to-day than legitimate software.  This causes AV signature databases to grow in…

Read More

Check Point: A New Model for Security Management

Be More Efficient, Effective and Organized in Managing Your Security Today’s business demands for rapid innovation, coupled with emerging technologies like cloud computing and the proliferation of connected devices, are causing a disruption in IT security. Traditional approaches to managing security can no longer keep pace in these dynamic environments. A different approach is needed.…

Read More

Check Point: Mobile Attacks Storm the Doors of the Enterprise: Are you ready?

Cyber thieves are banging on smartphones and tablets with terrible brute force. They know the mobile devices your employees use for personal and work purposes are treasure troves of valuable, unprotected data. But bolstering your security to protect against new, unknown mobile threats is tricky. Join our webinar to hear how security experts at Samsung…

Read More

Cylance: Stuart McClure talks with Richard Stiennon

CEO Stuart McClure discusses how Cylance® is revolutionizing cyber threat protection by applying artificial intelligence and machine learning to make security silent. Watch the video to understand how Cylance can help your company stop malware attacks before they execute and wreak havoc on your endpoints. 

Read More

March 2016

March 2016 Newsletter New Case Study Published: Binghamton University MILPITAS, Calif. & PITTSFORD, N.Y.–(Business Wire) – Array Networks Inc., a global leader in application delivery networking, announces that Binghamton University, part of the State University of New York (SUNY) system, has selected Array’s APV series application delivery controllers for high availability and guaranteed performance of mission-critical student…

Read More