Interfocus Blog

Eight Common Mistakes in IT Asset Management and How to Avoid Them

Eight Common Mistakes in IT Asset Management and How to Avoid Them

As an IT professional, like anyone else, mistakes are inevitable. Unfortunately, with your business’s growing reliance on digital data ... Read more >

Understanding Insider Threats: A real, but often ignored, source of cyber risk

Understanding Insider Threats: A real, but often ignored, source of cyber risk

You may think that the notion of insider threats is something from a movie or a conspiracy theory site. However, the reality is that ... Read more >

Employee Internet Monitoring — Big Brother or Big Benefits?

Employee Internet Monitoring — Big Brother or Big Benefits?

That undeniable feeling that you’re being watched can be unsettling. Sensing that your every move is being monitored may cause you to ... Read more >

Monitoring Healthcare Endpoints and Users Is Your Best Remedy for Your Security Program

Monitoring Healthcare Endpoints and Users Is Your Best Remedy for Your Security Program

In the recent US midterm elections, healthcare was a key factor for voters. Americans are clearly worried about healthcare coverage and Read more >

Case Study: Manufacturer Increases Security and Compliance with Interfocus

Case Study: Manufacturer Increases Security and Compliance with Interfocus

Selecting a stable and comprehensive security solution took on additional importance when a manufacturing company was asked to comply ... Read more >

Case Study: Defense Client Ensures Regulatory Compliance with Interfocus

Case Study: Defense Client Ensures Regulatory Compliance with Interfocus

A defense manufacturer that controls the export and import of defense-related articles and service found themselves struggling to ... Read more >

Today’s Technology Tip: Clean Out Your Downloads Folder

Today’s Technology Tip: Clean Out Your Downloads Folder

How often do you clean out your Downloads folder? I suggest that you regularly delete the files you no longer use to get rid of DLL ... Read more >

A New Key to Security

A New Key to Security

Headlines about security breaches are everywhere. Some security professionals suggest having multi-factor authentication (MFA) ... Read more >

Client Prevents Threats by Combining Interfocus and CylancePROTECT

Client Prevents Threats by Combining Interfocus and CylancePROTECT

The financial services industry is constantly under attack. Some firms estimate more than a million new pieces of malware are being ... Read more >

Today’s Technology Tip: Watch Those File Extensions!

Today’s Technology Tip: Watch Those File Extensions!

Simple but highly recommended method to unmask malware executables masquerading as other file types Read more >

Your User’s Digital Footprints: The Key to Recovering from Attacks

Your User’s Digital Footprints: The Key to Recovering from Attacks

Like human fingerprints, your employees’ network activity leave behind digital footprints, or a unique set of tracks that identify who ... Read more >

Today’s Technology Tip: Backup for Security

Today’s Technology Tip: Backup for Security

We are pleased to introduce a new component to our blog, wherein Masa Hashiguchi, Interfocus’ Lead Solutions Engineer, shares best ... Read more >

Schedule a Demo