View Post

How to Prepare Your Technology During Winter Break

In Education by Ken Nero

With the Winter Recess upon us, now is a great time to get your school’s network ready for the second half of the school year. Below is a checklist recommended by IKON which will make sure your network is running at full efficiency when everyone returns after the New Year. Re-Image Computers – Imaging is a great way to keep computers …

View Post

Why Your School Needs an ADA Compliant Website

In Education by Ken Nero

This is a guest blog post provided by our trusted partner Niki Jones Agency, Inc. In this modern era where the majority of the population, including students, frequently use the online web, it’s crucial for all users to have fair access to educational websites – ones that are fully accessible to them, whether they are able-bodied or not. This is not …

View Post

10 Steps to Creating a Technology Roadmap for Your School or District

In Education by Ken Nero

Schools and districts are usually under budget for their IT needs. The best way to minimize IT expenditures and invest in technology wisely is to develop a technology roadmap. A technology roadmap is a technology plan which takes into account the school’s or district’s needs for each year. This allows the organization to plan out their E-rate and other funding …

View Post

Ransomware by the Numbers

In Cybersecurity by Ken Nero

Ransomware continues to be Public Enemy Number One in terms of IT security concerns, representing more than 60% of all malware attacks. As the threat of Ransomware grows, organizations are under increased pressure to protect themselves and their critical data. At IKON, we take data protection seriously and want to ensure organizations like yours are armed with the facts. The following statistics …

View Post

FatPipe Unleashes New Integrated VNF/SD-WAN Offering for Enterprises

In IKON in the News, WAN by Ken Nero

*This article originally appeared on ChannelPartnersOnline.com.  FatPipe Networks has unveiled an enterprise product for SD-WAN that allows for what the company says is easy deployment of network functions virtualization (NFV). FatPipe Virtualized Network Function (VNF) integrates SD-WAN functionality with routing, firewall, security, DPI (deep packet onspection), QoS, WAN optimization and domain name system (DNS) management to allow the digital transformation of NFV. It allows enterprises and …

View Post

INFOGRAPHIC: The Growth of Technology Expenses in Education

In Education by Ken Nero

It’s no secret that technology use is increasing at a rapid place, and schools are under increased pressure to keep up. In turn, technology expenses in the education arena are growing at a faster clip each year, and it’s more important than ever for school’s to reign in their spending and keep a close eye on how their budgets are …

View Post

The Ultimate Test: Is Your School’s Current IT Services Provider Up to the Challenge

In Education by Ken Nero

Finding an honest, reliable and capable IT services provider can be tricky for any organization, and especially for schools where the stakes are high and providing the best learning environment for students is the primary objective. With increased demands for technology use in the classroom, it’s more important than ever for leaders in education to collaborate with experts who can …

View Post

Devices Hacked by Linux Malware

In Cybersecurity, Uncategorized by Ken Nero

Thousands of devices have been hacked by a Linux malware named Rakos, and while researchers have yet to see any actual malicious activity involving the botnet, they believe it could be used for powerful distributed denial-of-service (DDoS) attacks. Rakos, whose existence was brought to light in December 2016 by ESET, targets Linux systems by launching brute-force attacks via SSH. The …

View Post

iOS Security Broken with a Simple Wi-Fi Connection

In Cybersecurity, WiFi by Ken Nero

Apple CEO Tim Cook announces the new iPhone 7 during an event to announce new products, in San Francisco. The blurb for a presentation at the Black Hat Asia hacking conference this week would likely concern any iPhone owner: “The victim will only have to join the Wi-Fi network, and then the device will be compromised without any user interaction, …

View Post

Linksys Routers Attacked by Hijackers Via Flaws

In Cybersecurity, WiFi by Ken Nero

Attackers could exploit the vulnerabilities to crash routers, extract sensitive information from them or take them over The Linksys WRT3200ACM router. Two dozen Linksys router models are vulnerable to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over. The vulnerabilities were discovered by senior security consultant Tao Sauvage from …