<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Alex Jablokow
Alex Jablokow is a freelance writer who specializes in technical and healthcare business. He blogs about the Internet of Things, software, inertial guidance systems, and other topics for business clients. Sturdy Words, his freelance content business, is at www.sturdywords.com.
Find me on:

Recent Posts

Posted on 04.11.18 by Alex Jablokow

Should You Hire A Cloud Storage Security Vendor?

The decision to use a third-party vendor or not depends on several factors. Regardless, cloud data security is a crucial part of business planning.

Posted on 03.19.18 by Alex Jablokow

Edge Computing Vs Fog Computing

The cloud liberated computing power, applications, and data storage from reliance on specific hardware managed in a specific location. But the Cloud does typically exist in a specific location: a facility somewhere with racks of servers.

Posted on 02.27.18 by Alex Jablokow

We Need to Increase Focus on Endpoint Security

Increasingly, corporate work is being carried out on mobile laptops, tablets, and smartphones, and corporate data is being held outside of the company’s own systems. 

Posted on 01.24.18 by Alex Jablokow

Balancing Security and Ease of Use with Two-Factor Authentication

Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...

Posted on 01.11.18 by Alex Jablokow

Cybersecurity Cost: How Should It Fit Into Your Budget?

Cyber risk leads to financial risk, but cybersecurity is still often thought of as a technical rather than a business problem.

Posted on 01.09.18 by Alex Jablokow

The Current State of WAN Security

Increased use of cloud applications and other developments are transforming WAN implementations, improving security in the process.

Posted on 01.04.18 by Alex Jablokow

Hackers And Hoodies: A Timeless Duo

Hackers probably don't look the same way they're portrayed in the media. So, why have the quintessential images of dark, mysterious hackers prevailed?

Posted on 12.29.17 by Alex Jablokow

VoIP and the Wild World of Toll Fraud

Most don't think about their telephone system when it comes to securing their network, but VoIP is actually a common vector of attack. 

Posted on 12.19.17 by Alex Jablokow

SIEM Evolution: From Compliance to Security

Security information and event management (SIEM) software provides a way to track, integrate, and analyze the vast amount of log data that comes from an organization’s applications and network hardware. Its original value came from compliance reporting, but it is...

Posted on 12.06.17 by Alex Jablokow

Are MSSPs a Good Security Solution for Small Businesses?

An increasingly popular alternative is hiring a managed security service provider (MSSP). What is it and how can it help keep your business secure?

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.