<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=233366977071653&amp;ev=PageView&amp;noscript=1">

Explore new topics and find answers in our extensive resource center

OBT Cloud

What is local desktop management?

Local Desktop Management is a comprehensive IT solution that enables the management of many devices from a single, centr...

Continue reading
Posted On 06/13/2018 by OBT

What Is Cybersecurity Deep Auditing?

Cybersecurity Deep Auditing is an internal audit of logged activities across a network to ensure security strategies are...

Continue reading
Posted On 05/30/2018 by OBT

What is advanced threat protection for web?

Advanced Threat Protection (ATP) for Web is a subscription-based anti-malware solution. It is the first line of defense ...

Continue reading
Posted On 05/16/2018 by OBT

What is employee monitoring?

Employee monitoring is a cybersecurity method that monitors and records employee activity online to safeguard sensitive ...

Continue reading
Posted On 05/02/2018 by OBT

Ransomware gives way to new malware

 Ransomware is on the decline. The telltale notes that once demanded payment from victims in hope that they’d comply are...

Continue reading
Posted On 04/25/2018 by OBT

What is application lock-down and intelligence?

Application lock-down and intelligence is a security measure that protects a system against internal threats within a ne...

Continue reading
Posted On 04/19/2018 by OBT

Cybersecurity costs are on the rise. Here’s what you need to know to secure your infrastructure.

Cybercrime has become a top concern for enterprises and small business around the globe. A number of massive attacks las...

Continue reading
Posted On 04/11/2018 by OBT

What is Advanced Threat Protection for Email?

 Advanced threat protection (ATP) for email is a cloud-based security service that protects organizations from incoming ...

Continue reading
Posted On 04/04/2018 by OBT

What is basic perimeter and internal vulnerability testing?

Basic perimeter and internal vulnerability testing looks for loopholes or vulnerabilities in a computer system, applicat...

Continue reading
Posted On 03/28/2018 by OBT

Antivirus solutions are on the decline. Do you still need one?

Cyberattacks are increasing around the globe. Last year’s attacks were a disastrous reminder of the need for greater sec...

Continue reading
Posted On 03/28/2018 by OBT

Why Fileless attacks need to be on your radar

Last year was rife with cybersecurity horror stories, from major global attacks like the WannaCry ransomware to the Equi...

Continue reading
Posted On 03/14/2018 by OBT

What is Managed Two-Factor (2FA) Authentication?

Managed Two-Factor (2FA) Authentication is a security measure that requires an individual to verify their identity by pr...

Continue reading
Posted On 03/07/2018 by OBT

What is Comprehensive Anti-Virus and Malware Protection?

Comprehensive anti-virus and malware software monitors, analyzes and tests potential security threats in order to minimi...

Continue reading
Posted On 02/21/2018 by OBT

What Is Mobile Device Management (MDM)?

Mobile Device Management (MDM) enables businesses to manage company devices and personal mobile devices from a central l...

Continue reading
Posted On 02/07/2018 by OBT

What Is Disaster Recovery?

  Disaster recovery is a set of plans and strategies designed to help a business recover after natural disasters, cybera...

Continue reading
Posted On 01/24/2018 by OBT

What is Business Continuity?

Business continuity allows companies to get back on their feet after internal failures, cyber attacks, natural disasters...

Continue reading
Posted On 01/10/2018 by OBT

PoodleCorp, Lizard Squad and a Year of Massive Cyber Attacks

 Over the holiday weekend, the co-founder of Lizard Squad and PoodleCorp pleaded guilty to operating a hacking-for-hire ...

Continue reading
Posted On 01/03/2018 by OBT

What is a Password Manager in Cyber Security?

Research shows that poor password practices account for 63% of data breaches. A password management servicer is a third ...

Continue reading
Posted On 12/27/2017 by OBT

What are Identity Management Services?

Identity Management Services (IMS) safely store information, and control the distribution and restriction of that data t...

Continue reading
Posted On 12/13/2017 by OBT

The Latest on the Uber Data Breach

Uber is in the spotlight yet again: this time, because of a 2016 data breach the rideshare company allegedly hid until j...

Continue reading
Posted On 12/06/2017 by OBT

Subscribe to our newsletter