November 3, 2016
Election season is finally coming to a close. Regardless of who you’re voting for, I’m pretty sure you’re as ready to be done with debates and political ads as I am. There have been endless arguments about which side is right on a range of issues. But, there is one issue that has come up across both parties and in multiple formats, that we can all agree on – cybersecurity is a crucial effort that needs our attention, no matter who we are or what business we’re in. These candidates can, and should, make a concerted effort to set the bar for higher data security standards.
DarkSecurity tells us more:
Both Democratic nominee Hillary Clinton and Republican nominee Donald Trump this year each have had firsthand experiences at the hands of hackers… Neither candidate has demonstrated savvy deployment of security of their own systems: Clinton has been under fire for her use of a personal email server and account while serving as Secretary of State, while security researchers revealed that Trump’s own email servers used the outdated and no longer-supported Microsoft Windows 2003 Server software, as well as a flaw in his campaign’s public website that left intern resumes exposed.But in a year when cybersecurity has been a major mainstream newsmaker and the threat of more cyberattacks from Russia loom over the Presidential election, both Clinton and Trump have an opportunity to spin their missteps and real-world data breach experiences into fresh personal perspectives on lessons learned in the need for stronger security posture for the US government, private industry, and private citizens, security experts say.“If they get religion on this topic, they could be poster children for all of us in becoming more” security-savvy, says Jack Danahy, co-founder and CTO of Barkly, a security software vendor. Clinton’s use of a private email server, as well as former Secretary of State Colin Powell’s use of personal email during his tenure, reflect the infamous security tradeoff theme of “convenience versus security,” Danahy says.“It’s important that they both appreciate cybersecurity as a major factor in policy-making,” says Michael Marriott, a research analyst with Digital Shadows. “They have to show an appreciation of the importance of the issue. But it’s such a fast-moving area,” which makes that challenging for politicians to keep up with, he notes.
Keeping up with ever-evolving cybersecurity threats isn’t just hard for politicians, it’s hard for everyone. Every time we learn to prevent or protect ourselves against one threat, three more arise. Viruses, protocol breaches, phishing, ransomware… it’s an endless assault against our network security. If you’re not in the security business, it’s almost impossible to keep your defenses up-to-date.
Corporate Technologies Group can be your first line of defense. We support clients from network design to implementation, post-install support and remediation. We also provide 24/7/365 network monitoring services. We can help protect your data. Contact us today.
If you’d like to have an assessment of your security done, the experts at CTG have put together this checklist that can be an essential guide to ensuring your company is up-to-date with your security.
Recent Blog Posts...

Mar. 10, 2026
The Cloud Isn’t Just “Out There” — It’s Tied to Your Network

Mar. 03, 2026
“I Can Feel It Coming in the Air Tonight”… And So Can Your Network

Feb. 24, 2026
Top 5 Ways Credit Unions Can Use An AI Assistant

Feb. 17, 2026
How Ohio Credit Unions Should Think About Disaster Recovery Connectivity and Bandwidth

Feb. 10, 2026
How Credit Unions Should Evaluate Technology Buying Decisions (Without Getting Boxed In)
- Application Integration5
- Application Performance16
- Asset Management1
- Bandwidth Management7
- Business Continuity / Disaster Recovery41
- BYOD7
- Cloud48
- Collaboration17
- Communication17
- Compliance3
- Contact Center1
- Cyber Liability Insurance1
- Cybersecurity31
- Dark Web1
- Hosted Phone46
- Hybrid Working2
- Internet3
- Internet of Things6
- IT Infrastructure13
- Managed Network Services9
- Managed Services8
- Microsoft Teams2
- Network Performance28
- Network Security31
- News11
- Press Release2
- Risk Assessment1
- SIP Trunking3
- Technology Audit3
- Telehealth3
- Uncategorized37
- Unified Communications48
- VoIP36
- Work From Home3

