Blog

An Important Message from our CEO

Dear Valued Customers, As you know, Hurricane Dorian is forecast…

Blog

CloudLock Series: Part 3 – Permissions Contained

Meet Steve. Steve is a traveler. Steve travels so much that his…
Cloudlock Part 2, Greyson Technologies

Blog

CloudLock Series: Part 2 – Permissions Contained

Hey… you! Shh!! I have the details on our top-secret laser…
Cisco Cognitive Collaboration, Greyson Technologies

Blog

Cisco Cognitive Collaboration Features Unveiled

I have been along for the Cisco Collaboration ride for the past…
Greyson Technologies, Cisco CloudLock

Blog

CloudLock Series: Part 1 – Permissions Contained

Hi! I'm Mike, we've just met, and I'd like full, permanent, and unmonitored access to your contacts. Don't want to give that up, huh? How about your calendar? Email? Maybe all your files?

In this 3-part series we'll discover you don't know what access your users have freely given up to that developer without a name and what to do about it.
Unified communications helping 3 people work together.

Blog

5 Ways That Unified Communications Drive Collaboration

If you want your workers and project managers to work in unison effectively, you’ll need the speed and efficiency that unified communications brings.
Enterprise collaboration with 3 people talking among one another.

Blog

What Businesses Need to Know about Enterprise Collaboration

Enterprise collaboration is becoming less of an optional tool and more of a necessity in today’s business environment. Here’s what you must know.
collaboration risks being personified by a bunch of hands grabbing each other

Blog

3 Enterprise Collaboration Risks to Avoid

Collaboration in the enterprise is critical for success. And, as with any technology, there come with it certain risks that you must take great care to avoid.
BYOD Policy with multiple devices stacked atop one another.

Blog

4 Things to Keep in Mind When Creating a Secure Enterprise BYOD Policy

Enterprises that wish to implement BYOD must take great care to create a solid policy. Here are 4 things that you should keep in mind when creating it.
IT incident response team looking at an error on a PC

Blog

The Critical Steps to IT Incident Response

It’s vital to monitor your IT infrastructure for faults and errors. Even a small nuisance can become a big problem if left unchecked.