Blog

The activereach blog offers education and inspiration in #security and #connectivity. Our aim is to share vital knowledge with business professionals across all functions – so that they can understand the impact of emerging technology trends and gain insight into how these could be adopted in their organisations.

All content is our own, created by our salesteam, support engineers, tech consultants, and directors. We also pick the best of our technology partners’ blogs, re-published with their kind permission. Opinions expressed are the authors’ own. Comments gratefully received at marketing@activereach.net.

Blog

How the COVID-19 Pandemic Has changed IT & Security

While the COVID-19 pandemic has disrupted business models around the world, the adoption of modern application and cloud technologies continues to grow.

Here we are sharing a blog from our partners Sumo Logic. Their Continuous Intelligence Report provides an inside look into the state of the modern application technology stack, including changing trends in cloud and application adoption and usage by customers, and the impact of COVID-19 as an accelerant for digital transformation efforts.

more →

Blog

The Hidden Mobile Threat Landscape

Every year we become more mobile-centric and during 2020 the pandemic accelerated that growth. At the same time attacks on mobile devices are increasing and are often very different from those in a desktop computer world. News about new mobile threats is a regular occurrence and will only increase.  But that is not the only mobile security issue we face.

more →

Blog

Worldwide IT Spending to Grow in 2021 Despite Effects of Global Pandemic

Digital Transformation Offsets the Negative Effect on IT Spending due to COVID-19.

Gartner forecasts that Worldwide IT spending is projected to total $3.9 trillion in 2021, an increase of 6.2% from 2020.  This is a reversal of the decline in spending of 3.2% seen in 2020 as CIOs prioritized spending on “mission-critical” technology and services at the start of the pandemic.

more →

Blog

How 3rd Party Apps Can Compromise The Security of SaaS Environments

 

Risk of 3rd party applications has always been a concern for security teams. The SolarWinds breach is an example of a 3rd party application inserting a vulnerability into an otherwise secure infrastructure. While the SolarWinds breach occurred in an on-premise environment, 3rd party apps can also create vulnerabilities in SaaS environments.

more →