<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=233366977071653&amp;ev=PageView&amp;noscript=1">

Explore new topics and find answers in our extensive resource center

OBT Cloud

Antivirus solutions are on the decline. Do you still need one?

Cyberattacks are increasing around the globe. Last year’s attacks were a disastrous reminder of the need for greater sec...

Continue reading
Posted On 03/28/2018 by OBT

Why Fileless attacks need to be on your radar

Last year was rife with cybersecurity horror stories, from major global attacks like the WannaCry ransomware to the Equi...

Continue reading
Posted On 03/14/2018 by OBT

What is Managed Two-Factor (2FA) Authentication?

Managed Two-Factor (2FA) Authentication is a security measure that requires an individual to verify their identity by pr...

Continue reading
Posted On 03/07/2018 by OBT

The rise and crackdown on crypto crime

Bitcoin has raised a lot of questions since its inception. Governments, nations and institutions have begun considering ...

Continue reading
Posted On 02/28/2018 by OBT

What is Comprehensive Anti-Virus and Malware Protection?

Comprehensive anti-virus and malware software monitors, analyzes and tests potential security threats in order to minimi...

Continue reading
Posted On 02/21/2018 by OBT

The next generation of wireless is nearly upon us—and it’s fast

Blockchain. AI. VR. Automation. IoT. The tech world has been going strong in the direction of the next great thing. And ...

Continue reading
Posted On 02/14/2018 by OBT

What Is Mobile Device Management (MDM)?

Mobile Device Management (MDM) enables businesses to manage company devices and personal mobile devices from a central l...

Continue reading
Posted On 02/07/2018 by OBT

How the blockchain is shaping the legal industry

The blockchain has been revolutionizing industries around the globe. From cross-border payments and health and education...

Continue reading
Posted On 01/31/2018 by OBT

What Is Disaster Recovery?

  Disaster recovery is a set of plans and strategies designed to help a business recover after natural disasters, cybera...

Continue reading
Posted On 01/24/2018 by OBT

How Cryptocurrencies and Blockchain Will Shape the Professional Services Industry

Behind the rise of cryptocurrencies like Bitcoin and Ethereum lies a technology that is revolutionizing more than just t...

Continue reading
Posted On 01/17/2018 by OBT

What is Business Continuity?

Business continuity allows companies to get back on their feet after internal failures, cyber attacks, natural disasters...

Continue reading
Posted On 01/10/2018 by OBT

PoodleCorp, Lizard Squad and a Year of Massive Cyber Attacks

 Over the holiday weekend, the co-founder of Lizard Squad and PoodleCorp pleaded guilty to operating a hacking-for-hire ...

Continue reading
Posted On 01/03/2018 by OBT

What is a Password Manager in Cyber Security?

Research shows that poor password practices account for 63% of data breaches. A password management servicer is a third ...

Continue reading
Posted On 12/27/2017 by OBT

Research shows social media could be programming society for failure

 Social media use has risen exponentially over the last few years. Today, 91% of 16-24 year olds use the internet for so...

Continue reading
Posted On 12/20/2017 by OBT

What are Identity Management Services?

Identity Management Services (IMS) safely store information, and control the distribution and restriction of that data t...

Continue reading
Posted On 12/13/2017 by OBT

The Latest on the Uber Data Breach

Uber is in the spotlight yet again: this time, because of a 2016 data breach the rideshare company allegedly hid until j...

Continue reading
Posted On 12/06/2017 by OBT

What is Skype for Business?

 Skype for Business, formerly Microsoft Lync Server, is a platform that allows businesses to hold online meetings as if ...

Continue reading
Posted On 11/29/2017 by OBT

What are cyber security assessment services?

Cyber security assessment services analyze and redress the causes and risk factors of known security gaps in a company’s...

Continue reading
Posted On 11/15/2017 by OBT

Presenting NASA’s 20 Candidates for Interstellar Habitation

For the last 6 years, the Kepler spacecraft has been scouring the galaxy for habitable planets similar to our own. After...

Continue reading
Posted On 11/08/2017 by OBT

What is Advanced Penetration Testing in Cyber Security?

Advanced cyber penetration testing identifies gaps in system security, network security, employee knowledge and training...

Continue reading
Posted On 10/31/2017 by OBT

Subscribe to our newsletter