With the Winter Recess upon us, now is a great time to get your school’s network ready for the second half of the school year. Below is a checklist recommended by IKON which will make sure your network is running at full efficiency when everyone returns after the New Year. Re-Image Computers – Imaging is a great way to keep computers …
Why Your School Needs an ADA Compliant Website
This is a guest blog post provided by our trusted partner Niki Jones Agency, Inc. In this modern era where the majority of the population, including students, frequently use the online web, it’s crucial for all users to have fair access to educational websites – ones that are fully accessible to them, whether they are able-bodied or not. This is not …
10 Steps to Creating a Technology Roadmap for Your School or District
Schools and districts are usually under budget for their IT needs. The best way to minimize IT expenditures and invest in technology wisely is to develop a technology roadmap. A technology roadmap is a technology plan which takes into account the school’s or district’s needs for each year. This allows the organization to plan out their E-rate and other funding …
Ransomware by the Numbers
Ransomware continues to be Public Enemy Number One in terms of IT security concerns, representing more than 60% of all malware attacks. As the threat of Ransomware grows, organizations are under increased pressure to protect themselves and their critical data. At IKON, we take data protection seriously and want to ensure organizations like yours are armed with the facts. The following statistics …
FatPipe Unleashes New Integrated VNF/SD-WAN Offering for Enterprises
*This article originally appeared on ChannelPartnersOnline.com. FatPipe Networks has unveiled an enterprise product for SD-WAN that allows for what the company says is easy deployment of network functions virtualization (NFV). FatPipe Virtualized Network Function (VNF) integrates SD-WAN functionality with routing, firewall, security, DPI (deep packet onspection), QoS, WAN optimization and domain name system (DNS) management to allow the digital transformation of NFV. It allows enterprises and …
INFOGRAPHIC: The Growth of Technology Expenses in Education
It’s no secret that technology use is increasing at a rapid place, and schools are under increased pressure to keep up. In turn, technology expenses in the education arena are growing at a faster clip each year, and it’s more important than ever for school’s to reign in their spending and keep a close eye on how their budgets are …
The Ultimate Test: Is Your School’s Current IT Services Provider Up to the Challenge
Finding an honest, reliable and capable IT services provider can be tricky for any organization, and especially for schools where the stakes are high and providing the best learning environment for students is the primary objective. With increased demands for technology use in the classroom, it’s more important than ever for leaders in education to collaborate with experts who can …
Devices Hacked by Linux Malware
Thousands of devices have been hacked by a Linux malware named Rakos, and while researchers have yet to see any actual malicious activity involving the botnet, they believe it could be used for powerful distributed denial-of-service (DDoS) attacks. Rakos, whose existence was brought to light in December 2016 by ESET, targets Linux systems by launching brute-force attacks via SSH. The …
iOS Security Broken with a Simple Wi-Fi Connection
Apple CEO Tim Cook announces the new iPhone 7 during an event to announce new products, in San Francisco. The blurb for a presentation at the Black Hat Asia hacking conference this week would likely concern any iPhone owner: “The victim will only have to join the Wi-Fi network, and then the device will be compromised without any user interaction, …
Linksys Routers Attacked by Hijackers Via Flaws
Attackers could exploit the vulnerabilities to crash routers, extract sensitive information from them or take them over The Linksys WRT3200ACM router. Two dozen Linksys router models are vulnerable to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over. The vulnerabilities were discovered by senior security consultant Tao Sauvage from …