Male hands using a low profile keyboard, overlaid with tech graphics

Blog

Articles by Function4

Cybersecurity in 2021

August 3rd, 2021 by Kevin Craine

Cybersecurity in 2021

Cybersecurity was a pressing concern even before COVID-19. Now, organizations everywhere must prepare for a new normal that includes increasingly sobering threats to data security. Over the past several months, cyber thieves have become skilled...

Read Full Story »

Posted in: Cybersecurity

3 Common Security Mistakes When It Comes to Printing in Federal Organizations

March 16th, 2021 by Steve Kelley

Technician getting stressed over server maintenance in server room

In 2019, the online training platform Skillbox sent a rogue print job to unsecured network printers. To do that, they relied on a search tool called Shodan that discovers vulnerable Internet-connected devices. It was the very same tool that a prankster...

Read Full Story »

Posted in: Cybersecurity, Document Management

How to Use Approved Group Purchasing Contracts to Make Purchases

November 12th, 2020 by Ryan Skinner

The Ins and Outs of Signing a Listing Agreement - Aviara Real Estate

When organizations face making purchases, they first must consider what process they need to follow. Some organizations even go as far as creating a policy requiring at least three bids. The main reason is to ensure you are getting the best price for...

Read Full Story »

Posted in: General

How a Cybersecurity Breach Can Impact Your Business

April 3rd, 2019 by Function4

cybersecurity breach unlocked

When you leave the office each evening, you probably lock the doors and set the security alarm. This seems obvious since you don’t want criminals breaking into your business. But do you treat cyberthreats with the same caution? After all, you probably...

Read Full Story »

Posted in: Cybersecurity