Blog Posts for Network Security

Windstream Invests in Detroit Expansion

Detroit_blog.png

There are few cities in America as interesting as Detroit. It has such a variety of influences that people can't agree on a nickname. Whatever you call it -- the Motor City, the Arsenal of Democracy, Motown, Hockeytown, the 313 – there is no question that Droit is beloved by its residents.

We are proud to invest in our hometown of Little Rock

1948 LR skyline_278x278_color.jpg

Those of us who work at Windstream are proud to call Little Rock, Arkansas, home. Windstream is headquartered here, and our company’s connection to the city goes back nearly 75 years.

So you can imagine how excited we are to announce a major expansion of the local metro fiber network in our community. That’s because it creates a new level of connectivity and network stability for all local businesses, and expands the services that are available to our local customers.

Standing Up for Businesses in Dallas that Need Fiber Deployments, Not Empty Promises

Dallas Skyline

When it comes to high-speed fiber deployments, Dallas has had its heart broken in the past. In fact, the city’s most recent “left at the altar” moment happened just last fall when a major provider announced it would hit the “pause” button on a planned fiber roll-out.

If You Think Network Security is Costly…

By
Cost of Security Failures Pie Chart tn

The high cost of network security failures just might have you rethinking network and data security costs. Get the “You Will Be Breached: How Much Will It Set Back Your Business?” IDC/Windstream study. See how the high cost of network security breaches are driving network security management decisions.

Live from Enterprise Connect: Inside the Mind of a Voice Hacker: The Evolution of Voice Threats

By
Enterprise Connect Vert

Live from the “Inside the Mind of a Voice Hackers: The Evolution of Enterprise Voice Threats” session at Enterprise Connect, our Windstream blogger shares panelists’ first-hand knowledge of some of the complex tools and techniques hackers use to attack UC and voice systems—with tips on how to counter measure and address these attacks.