<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Bill Smeltzer

Find me on:

Recent Posts

An Uptick in Cybercrime: How to Prepare Against Malicious Hackers

Posted by Bill Smeltzer on Wed, Apr 14, 2021

 

Read More

Defending Your Organization Against Security Breaches: A 10 Step Approach

Posted by Bill Smeltzer on Thu, Dec 17, 2020


By Bill Smeltzer, CSO

Read More

Focus Technology Launches IT SecurManage to Meet Critical Market Need for Network Security

Posted by Bill Smeltzer on Tue, Jul 28, 2020

By Bill Smeltzer, CSO

JULY 28, 2020 Focus Technology, a leading provider of next-generation IT infrastructure, managed IT services, cyber security and cloud solutions, recently announced the launch of its custom solution, IT SecurManage. The solution was developed in response to a market need for a complete network infrastructure management solution, managed in the cloud as a service, that could offer comprehensive security and compliance auditability.

Read More

Topics: Network Security, IT Security

3 Steps You Can Take to Secure Your Network Infrastructure Post-COVID

Posted by Bill Smeltzer on Mon, Jul 27, 2020

By Bill Smeltzer, CSO

JULY 27, 2020 —As we discussed last month, security continues to emerge as a core challenge for organizations, particularly in recent months. In the blink of an eye, the world became more digitally connected than ever, which drastically increased the risk of cyberattacks. The vast constellation of remote offices, all tapping into their corporate networks from home computers and networks, has left organizations with a new attack surface to contend with.

Read More

Topics: Network Security, IT Security

Have you heard the term, “Social Engineering Hacking”?

Posted by Bill Smeltzer on Thu, Jul 23, 2020

By Bill Smeltzer, CSO

JULY 23, 2020 — With social engineering hacking, the hackers use information about a person found on social networks (e.g. Facebook, Twitter, SnapChat, Instagram, TikTok). What you may think is a harmless post can provide hackers with enough information to get access to your valuable accounts and data.

Read More

Topics: Network Security, IT Security