News Coverage

The Top 9 Most Secure Remote PC Access Software of 2014

— Remote access to PCs has long been a tricky IT staple. On the one hand, gaining authorized control to your device and its files is a great thing, allowing for users to have quick access to their most essential electronic items. But on the other hand, this convenience has become a bigger and bigger concern for sophisticated hackers and the infiltration techniques they employ to gain access to your devices. Now, the best remote PC access software isn't just the one with the most features; rather, it's the one that's the most difficult for an unauthorized user to breach. Full Story

How to Reduce ‘Tech Effort’ in Support Centers

— Resolving customer issues quickly and during the first interaction takes effort. It involves creating the right culture, integrating new technologies and improving processes. Market leaders are dedicating huge sums of money to enhance their customer support or acquiring companies with proven support technology to reach these goals. IBM's report,“The Customer-activated Enterprise,” surveyed more than 4,000 executives and came away with three common themes: companies want to be more open to customer influence, pioneer digital-physical innovation and craft engaging customer experiences. All three themes can be seen across the tech support industry. Customers want their tech issues resolved quickly, and in the communication style and channel they choose. Full Story

‘Backoff’ Malware: Time To Step Up Remote Access Security

— DHS issues advisory about remote desktop access tools associated with recent point-of-sale breaches. Another day, another security breach. Today, it’s a number of breaches that may or may not tie together, but all seem to have one thing in common: poor remote access security. Full Story

A wake-up call for retailers

— Earlier this month, it was reported that Information Systems & Supplies Inc. (IS&S), a food service point-of-sale (POS) and security systems provider, notified customers of a remote access breach that may have exposed card data from POS transactions. Full Story

20 Cost-Conscious Tips for Global Businesses Working with Multiple Vendors

— The chances you’ll be able to find one vendor to answer to all your IT issues is pretty slim. That’s why many companies, especially those expanding globally, try to amass a collection of “best of breed” tech vendors or an IT “A-Team.” Full Story

Outsourced tech support model continues to grow

— When multibillion dollar hedge fund Pequot Capital Management announced in 2009 it would close its doors at the end of that year, some senior members of the IT department were faced with decisions on the next step in their careers. "We had time to decide our next-step career-wise, so three of us got together and announced we were going to start SoundView," says Bill McGee, managing partner at SoundView IT Solutions, an outsource IT company. Full Story

Government Office/IT

— With Bomgar 14.2 software, technology support professionals can access and fix nearly any system or device, located anywhere in the world. The product enables remote access to desktops and laptops, to servers and switches, to smartphones and tablets. Full Story

The “Third Party” Threat In Your Retail Model

— Recently, I participated in an online chat with Solution Providers for Retail’s readers. The discussion focused on POS systems and network security challenges that retailers are facing. Previously, in my blog, Is Your POS Environment Secure?, I shared a few concerns that retailers should be aware of so as to not inadvertently allow hackers to access to their network. In this post I want to highlight some of the larger security challenges that vendors are facing, particularly within a franchise structure. The franchise model is unique as it undercuts many of the security best practices that larger enterprises often implement. Franchise locations represent the bigger business brand, but often manage their own technology operations and costs separately from the brand itself. Though the corporate entity may suggest a set of security guidelines, it is ultimately up to the franchise owner whether they will follow those recommendations. In this scenario, even those vendors with the most rigid policies and protocols are ultimately trusting the franchise to follow suit on its own accord. Full Story

Building a Foundation on Security and Compliance

— Recent high-profile security breaches in the retail, finance, and insurance industries underscore the need for organizations to keep data secure across a wide network of devices and systems accessed by customers, vendors, and remote workers. In the healthcare industry particularly, concerns over protecting sensitive patient data are heightened as organizations introduce more Internet-connected devices and deploy cloud environments to store and manage information. As these devices share more data across networks, IT professionals and medical device designers are faced with the challenge of how to keep this data secure. Medical devices, especially those that record patient data for remote-monitored outpatient care, must function as designed while adhering to FDA regulations and HIPAA laws governing privacy and security. Full Story

Why Bomgar’s remote support technology is finding appeal outside the enterprise

— Despite the deluge of coverage about cloud-based applications and services for small and midsize businesses (SMBs), not every small company is comfortable with the idea of operating in the cloud, especially in places where internet access isn't always reliable. Full Story

Page 2 of 44 pages: 1 2 3 4 Last
| Senior Director of Public Relations Bomgar Corporation