Cornerstone Information Technologies, LLC Recognized on CRN’s 2025 MSP 500 List

New York, NY, February 12, 2025 — Cornerstone Information Technologies, LLC is recognized in CRN’s Managed Service Provider (MSP) 500 list in the Pioneer 250 category for 2025.
Arctic Wolf and BlackBerry Announce Acquisition Agreement for Cylance

WATERLOO, ONTARIO and EDEN PRAIRIE, MINNESOTA – December 16, 2024 – Arctic Wolf® and BlackBerry Limited (NYSE: BB; TSX:BB), two global leaders in security software and services, today announced they have entered into a definitive agreement for Arctic Wolf to acquire BlackBerry’s Cylance® endpoint security assets. Cylance is the pioneer of AI-based endpoint protection trusted by thousands of organizations around the world. With this acquisition, Arctic Wolf ushers in a new era of simplicity, flexibility, and outcomes to the endpoint security market, delivering the security operations results customers have been asking for.
Cyber-skills: Building your own virtual superhero suit at home or at work (Part 1)

During this year’s Cybersecurity Awareness Month, we will explore the current landscape of online security threats, examine how individuals can safeguard themselves from potential breaches, and discuss strategies for organizations to empower their employees in defending against cyber-attacks.
Cybersecurity Basics: How to Safeguard Your Firm in an Evolving Digital Landscape

The digital world is constantly evolving and some parts of it are scary. What can a firm or company do to protect itself when it seems like the barbarians are constantly at the proverbial gate?
There are actually several basic steps you can do to protect your data and the data of your clients, not to mention your well-earned reputation.
Future-Proofing Your Law Firm: Key IT Investments for 2025

As a law firm CIO or COO, planning your 2025 information technology budget involves anticipating future needs, addressing current challenges, and leveraging technology to enhance attorney productivity and security. Firms will need to continue to invest in their cloud migration and hybrid-work plans, but here are some other critical areas to focus on.
Jim Moreo Interview at ILTACON 2024 with Jennie Azoulai

Interview with Jim Moreo with Jennie Azoulai (Legal Tech Publishing) at ILTACON 2024.
Why Do a Tech Assessment?

Whether you do them yourself or get some help, taking stock of your technology, your team’s skills and your processes is never a bad thing. Many firms do them every few years as a self-check. They help you identify gaps that need to be addressed and points the way to solutions that may not be evident until you see everything summarized in one place.
Key Takeaway from CrowdStrike Incident

This issue, affecting computers running Microsoft Windows, underscores the importance of having a reliable Managed IT Services provider.
Cornerstone.IT: Partnering Exclusively with Top-Tier Vendors for Premier Managed Services

Congratulations Arctic Wolf for being named a leader in the 2024 IDC MarketScape for Worldwide Managed Detection and Response report!
CISCO IOS and IOS XE Software Vulnerabilities

Cisco has released free software updates that address the vulnerabilities described in this advisory. Customers with service contracts that entitle them to regular software updates should obtain security fixes through their Updates Channel.