Blog

Here’s the latest news from FirstLight!

When Working Remotely is the Only Option

When Working Remotely is the Only Option

Many office workers are already familiar with how convenient it is to work remotely. We can grab our laptop and mobile phone and as long as we’ve got connectivity, we can do just about anything from anywhere. Online meetings and screen shares are a common everyday...

read more
Are You Making the Most of Your Contact Center?

Are You Making the Most of Your Contact Center?

Even in today’s world of online business, hands-on customer service is still an essential part of the customer journey. Call centers provide a human and personalized touch that consumers still crave. However, contact centers need technology to support these human...

read more
How to Prepare for the Rise of the Digital Curriculum

How to Prepare for the Rise of the Digital Curriculum

According to Statista, the e-learning market is on pace to top $243 billion worldwide by 2022. Digital curricula that consist of educational software that can be accessed over the Internet are part of this growing market. The software provides class materials along...

read more
How to Meet Healthcare IT Security Challenges

How to Meet Healthcare IT Security Challenges

The healthcare industry has been the target of cyberterrorism in the past, suffering attacks from both activists and foreign governments. In 2018, The U.S. Department of Justice announced the indictment of two individuals who staged ransomware attacks against...

read more
Is Your Company Protected From a DDoS Attack?

Is Your Company Protected From a DDoS Attack?

The distributed denial of service (DDoS) attack staged by the Mirai botnet in the fall of 2016 is legendary for its scale and reach. Hackers managed to weaponize thousands of unsecured IoT devices. The botnet was then used to flood the internet with traffic, crippling...

read more
How Government Agencies Can Archive Surveillance Video

How Government Agencies Can Archive Surveillance Video

Town, city, and state governments use closed-circuit TV (CCTV) cameras to monitor traffic and prevent, detect, and solve crimes. Some municipalities, such as Attleboro, MA, have even encouraged homeowners to register their surveillance cameras so the footage can be...

read more
5 Benefits of Accessing Cloud Computing Closer to Home

5 Benefits of Accessing Cloud Computing Closer to Home

Major cloud providers boast about their global reach and continuously work to expand it. As part of its 2020 Forecast, technology news source ITProPortal noted that major cloud providers are focused on “world domination.” For example, Microsoft has expanded its reach...

read more
3 Ways to Attempt a Ransomware-Free Future

3 Ways to Attempt a Ransomware-Free Future

Ransomware has become such a big problem that the U.S. Department of Homeland Security has issued an alert announcing that the Cybersecurity and Infrastructure Security Agency (CISA) has seen an alarming global increase of these attacks. The New York Times reported...

read more
Top 3 Challenges to Bringing Fiber to College Campuses

Top 3 Challenges to Bringing Fiber to College Campuses

When considering the entities that can benefit most from the speed and reliability of fiber, colleges and universities are top of mind. As centers of learning, their underlying mission is connectivity and the sharing of knowledge. Installing fiber on campus, however,...

read more
How Azure Stack Can Benefit Your Business

How Azure Stack Can Benefit Your Business

Microsoft Office 365 is now the most widely used cloud service, with an estimate that one out of every five corporate employees uses it. Despite the popularity of free Google Docs, Microsoft continues to dominate the office space. Microsoft’s success only continued...

read more
Ten Things to Know About DDoS Attacks

Ten Things to Know About DDoS Attacks

According to industry estimates, nearly 400,000 DDoS attacks are recorded each month worldwide. If you haven’t yet experienced a DDoS attack, unfortunately, chances are you may experience one in the near future. The good news: a DDoS attack doesn’t have to be...

read more
The Top 5 Benefits of Data Center Colocation

The Top 5 Benefits of Data Center Colocation

With cloud computing, 5G on the horizon, and the proliferation of IoT devices, it’s no surprise that data is growing at a rapid pace. The projected amount is rather stunning. According to IDC, data will grow by 61% — up to 175 zettabytes —  by 2025! Where will the...

read more
Is Dark Fiber the Right Choice for You?

Is Dark Fiber the Right Choice for You?

Dark fiber is a popular choice for organizations that have a need for high capacity connectivity and want as much control over their connectivity as possible. However, it’s not a be-all and end-all solution for every type of business. While many benefits can be had by...

read more
Disaster Recovery for Government Entities

Disaster Recovery for Government Entities

In the last few years, a new target has emerged for cyberattacks: government entities. Though national headlines have mostly centered on corporate attacks and national security breaches, government agencies on the local and state level have also seen a sharp increase...

read more
What You Need to Know About 5G and Fiber

What You Need to Know About 5G and Fiber

Over the last century, technology has evolved at a faster pace than any other time in human history. One smartphone holds more processing power than the computers that helped land mankind on the moon, and that moon landing was only 50 years ago. We are now at the...

read more
The Importance of Disaster Recovery for Healthcare

The Importance of Disaster Recovery for Healthcare

When it comes to cyberattacks, the healthcare industry is attractive to hackers for two primary reasons: It’s one of the fastest-growing industries in the United States, and it has a treasure trove of corporate and personal information. It’s proven so popular that...

read more
Why Your Call Center Needs the Cloud

Why Your Call Center Needs the Cloud

Many call centers still run on legacy technology and old software. The end result is using more resources to support the system and network, having less time to properly service customers, and losing out on valuable information to help the business grow. All three are...

read more