Back-to-Office Canceled: The New Phase of IT Spending
As we hit IT budget season for 2022, many organizations are delaying their back-to-the-office plans. Here's what that will mean for CIO IT spending
priorities next year.
Read More

Is Your Printer a Backdoor For Cyber Attacks?
Securing your printer is just
as important as securing your network from a cyber attack. Use our checklist to learn
what you should focus on when creating a printer security strategy.
Read Checklist

How APTs Become Long-term
Lurkers: Tools & Techniques of a Targeted Attack
A new report details the tools and techniques an Advanced
Persistent Threat (APT) group used to go undetected on a client network for over a year.
Read More

Recent Breaches Underscore High Healthcare Security Risk 
Healthcare institutions in California and Arizona are sending breach notification letters after attackers compromised thousands of patients' data
Read More

Two-thirds of Cloud Attacks Could Be Stopped By Checking
IBM says that over half of cloud security breaches are caused by issues simple to rectify.
Read More


In case you've missed any previous editions of This is IT, you can view them online at Visual Edge's website on the Resources page. 

You'll also find other helpful tools such as eGuides, checklists, videos and more. 

Visual Edge IT
6050 Corporate Way, Indianapolis, IN, 46278
Phone: 866-863-2266