News

As our world remains in a state of uncertainty, SyCom wants to remind you that we value our partnership in connecting you with technology solutions that can positively impact your business. Whether in times of trial or when celebrating shared success, we continue our commitment to deliver outstanding and memorable service in everything we do. As …

Read More

In the last article that I wrote, we focused on the language of Cybersecurity. I discussed how important it is for us to use a common language that all (technical and non-technical) can understand. Specifically, I wrote about three terms that get used a LOT and often in the incorrect context: risks, threats, and vulnerabilities. …

Read More

While looking a bit difference than years past, our Sales and Engineering Teams still started off the new year by virtually gathering for the 2021 SyCom Summit. The purpose of this internal, two-day kickoff event was to review company activity for 2020 and set initiatives for 2021. After an unprecedented times, this year our theme …

Read More

Each month, we try to put together an article to help better inform and engage our user community to current and important Cybersecurity considerations. In the second half of 2020, we at SyCom have been swamped with customers who are either A – concerned about how to make themselves more secure in preparation against threat …

Read More

We pleased to announce that we’ve been named Cisco’s SLED Impact Partner of the Year, for the second consecutive year. The awards were presented at the end of October at Cisco’s 2020 Partner Summit Digital conference.    Cisco’s Partner Summit awards are presented to partners who show tremendous value and growth across areas of importance …

Read More

The business landscape has undergone a significant transformation in recent years. An ever-increasing number of employees are working from remote locations, branch offices are opening, and business applications and data are moving into the cloud. While this functions to increase efficiency, maintain continuity, and drastically reduce costs, it presents a problem for traditional security architectures. …

Read More