<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=233366977071653&amp;ev=PageView&amp;noscript=1">

Explore new topics and find answers in our extensive resource center

OBT Cloud

Advice on Network Infrastructure Security

Doing business in the digital age offers so many opportunities to connect and communicate with your customers. But unfor...

Continue reading
Posted On 07/18/2018 by OBT

A Guide To 0365 And Security (Part II)

Welcome back. In this second part of our two-part series (Read Part 1 here), we’re continuing to explore the common chal...

Continue reading
Posted On 07/11/2018 by OBT

A Guide To 0365 And Security (Part I)

The cloud has been trending, and for good reason. Cloud based services, like Storage as a Service (SaaS), provide a powe...

Continue reading
Posted On 07/04/2018 by OBT

What is activity logging?

Activity logging tracks and records activity throughout a network to document and assess risk. This security method is o...

Continue reading
Posted On 06/27/2018 by OBT

Will the end of Net Neutrality lead to a slower, more costly internet?

Net Neutrality has been on a lot of minds lately. But as of this week in the U.S., Net Neutrality is no more.

Continue reading
Posted On 06/20/2018 by OBT

What is local desktop management?

Local Desktop Management is a comprehensive IT solution that enables the management of many devices from a single, centr...

Continue reading
Posted On 06/13/2018 by OBT

Papua New Guinea takes a stand against violence and fake news

Around the world, social media use has been on the rise. Despite the growing trend of younger users dividing their time ...

Continue reading
Posted On 06/06/2018 by OBT

What Is Cybersecurity Deep Auditing?

Cybersecurity Deep Auditing is an internal audit of logged activities across a network to ensure security strategies are...

Continue reading
Posted On 05/30/2018 by OBT

OBT Wins Trusted Systems Impact Award

Cloud solutions. Security innovation. Global telecommunications. All things IoT were trending at the Pipeline Conference...

Continue reading
Posted On 05/23/2018 by OBT

What is advanced threat protection for web?

Advanced Threat Protection (ATP) for Web is a subscription-based anti-malware solution. It is the first line of defense ...

Continue reading
Posted On 05/16/2018 by OBT

Facebook continues foray into AI with improved image recognition algorithms

Facebook has never been a stranger to the public eye or the news headlines. Between being the vehicle of choice for the ...

Continue reading
Posted On 05/09/2018 by OBT

What is employee monitoring?

Employee monitoring is a cybersecurity method that monitors and records employee activity online to safeguard sensitive ...

Continue reading
Posted On 05/02/2018 by OBT

Ransomware gives way to new malware

 Ransomware is on the decline. The telltale notes that once demanded payment from victims in hope that they’d comply are...

Continue reading
Posted On 04/25/2018 by OBT

What is application lock-down and intelligence?

Application lock-down and intelligence is a security measure that protects a system against internal threats within a ne...

Continue reading
Posted On 04/19/2018 by OBT

Cybersecurity costs are on the rise. Here’s what you need to know to secure your infrastructure.

Cybercrime has become a top concern for enterprises and small business around the globe. A number of massive attacks las...

Continue reading
Posted On 04/11/2018 by OBT

What is Advanced Threat Protection for Email?

 Advanced threat protection (ATP) for email is a cloud-based security service that protects organizations from incoming ...

Continue reading
Posted On 04/04/2018 by OBT

What is basic perimeter and internal vulnerability testing?

Basic perimeter and internal vulnerability testing looks for loopholes or vulnerabilities in a computer system, applicat...

Continue reading
Posted On 03/28/2018 by OBT

Antivirus solutions are on the decline. Do you still need one?

Cyberattacks are increasing around the globe. Last year’s attacks were a disastrous reminder of the need for greater sec...

Continue reading
Posted On 03/28/2018 by OBT

Why Fileless attacks need to be on your radar

Last year was rife with cybersecurity horror stories, from major global attacks like the WannaCry ransomware to the Equi...

Continue reading
Posted On 03/14/2018 by OBT

What is Managed Two-Factor (2FA) Authentication?

Managed Two-Factor (2FA) Authentication is a security measure that requires an individual to verify their identity by pr...

Continue reading
Posted On 03/07/2018 by OBT

Subscribe to our newsletter