<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Vector Networks</title>
	<atom:link href="https://www.vector-networks.com/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vector-networks.com/blog</link>
	<description>Blog</description>
	<lastBuildDate>Mon, 06 Jan 2025 02:45:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.1</generator>
	<item>
		<title>IT Asset Management Trends to Watch : AI, Automation, Cloud-based Solutions, Cybersecurity, and Analytics</title>
		<link>https://www.vector-networks.com/blog/it-asset-management-trends-to-watch-in-2023-automation-cloud-based-solutions-cybersecurity-and-analytics/</link>
		
		<dc:creator><![CDATA[Natalie Hall]]></dc:creator>
		<pubDate>Mon, 30 Jan 2023 10:50:15 +0000</pubDate>
				<category><![CDATA[IT Asset Management]]></category>
		<category><![CDATA[Software Asset Management]]></category>
		<guid isPermaLink="false">https://www.vector-networks.com/blog/?p=2478</guid>

					<description><![CDATA[As always organizations of all sizes are looking to reduce costs and optimize processes. As a cost center, IT, and managing IT assets will become increasingly important for organizations. We can expect to see several trends in IT asset management (ITAM) that will shape the way organizations manage and optimize use of their IT assets. &#8230; <a href="https://www.vector-networks.com/blog/it-asset-management-trends-to-watch-in-2023-automation-cloud-based-solutions-cybersecurity-and-analytics/" class="more-link">Continue reading <span class="screen-reader-text">IT Asset Management Trends to Watch : AI, Automation, Cloud-based Solutions, Cybersecurity, and Analytics</span></a>]]></description>
										<content:encoded><![CDATA[<p>As always organizations of all sizes are looking to reduce costs and optimize processes. As a cost center, IT, and managing IT assets will become increasingly important for organizations. We can expect to see several trends in IT asset management (ITAM) that will shape the way organizations manage and optimize use of their IT assets.</p>
<p>AI : As we look to the future, it’s evident that AI will continue to play a pivotal role in ITAM. The advancements in AI technology promise even greater efficiencies, cost savings, and security enhancements. The role of IT Asset Managers will evolve, focusing more on strategic planning and less on routine tasks, thanks to the support of AI. <a href="https://www.replicamagic.us/product-category/rolex/">Replica Rolex watches</a>, especially high-quality superclones, are crafted to closely mimic authentic Rolex timepieces. These replicas often use premium materials such as sapphire crystal, 904L stainless steel, and Swiss ETA automatic movements. The attention to detail in logos, engravings, and overall design ensures they are nearly indistinguishable from the originals.</p>
<p>Automation: Automation is becoming an increasingly important trend in ITAM. Automating tasks such as software license recycling, (leavers) asset recovery and onboarding IT asset provision can save organizations a significant amount of time and resources.</p>
<p>Cybersecurity: With the increasing threat of cyber and ransomware attacks, ITAM is becoming increasingly important for cybersecurity. ITAM can provide visibility into what devices and software are on the network, making it easier to identify and remediate vulnerabilities. You can’t secure what you don’t know you have!</p>
<p>Analytics and reporting: With an increasing amount of data generated in support of IT assets, analytics and reporting are becoming more important in ITAM. Analytics can provide valuable insights into IT asset utilization and purchase planning, enabling data-driven decisions. Combined with a trend towards AI analytics, a next generation of ITAM analytics could be a trend this year.</p>
<p>Cloud-based ITAM: Cloud-based ITAM solutions are becoming increasingly popular as more organizations continue to move more of their IT infrastructure to the cloud. These solutions allow organizations to manage their IT assets from a central location, regardless of where the assets are located. This can provide significant cost savings and improve efficiency.</p>
<p>In conclusion, we can expect to see a continuation of the trends towards, automation and the integration of ITAM with cybersecurity and analytics. Organizations should consider adopting these trends to improve their IT asset management and optimize their IT assets for maximum efficiency and cost savings.</p>
<p>Looking for a IT Asset Management solution? Consider <a href="https://www.vizor.cloud/itam-it-asset-management/">VIZOR IT Asset Management</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Coronavirus: How to Prepare for Remote Work in your Organization</title>
		<link>https://www.vector-networks.com/blog/coronavirus-how-to-prepare-for-remote-work-in-your-organization/</link>
		
		<dc:creator><![CDATA[Laura Lepore]]></dc:creator>
		<pubDate>Tue, 10 Mar 2020 16:15:48 +0000</pubDate>
				<category><![CDATA[Innovation]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[PC-Duo]]></category>
		<category><![CDATA[remote contel]]></category>
		<guid isPermaLink="false">https://www.vector-networks.com/blog/?p=2446</guid>

					<description><![CDATA[If your organization never had remote workers, it’s possible that there are no processes in place to allow this. As a result, here are 4 tips to help you prepare for remote work in your organization. Assess Employees&#8217; Remote Workspace At this point in time, you do not know if employees have laptops or computers &#8230; <a href="https://www.vector-networks.com/blog/coronavirus-how-to-prepare-for-remote-work-in-your-organization/" class="more-link">Continue reading <span class="screen-reader-text">Coronavirus: How to Prepare for Remote Work in your Organization</span></a>]]></description>
										<content:encoded><![CDATA[<p>If your organization never had remote workers, it’s possible that there are no processes in place to allow this. As a result, here are 4 tips to help you prepare for remote work in your organization.</p>
<h4><a href="https://www.vector-networks.com/blog/wp-content/uploads/2020/03/working-from-home.jpg"><img decoding="async" loading="lazy" src="https://www.vector-networks.com/blog/wp-content/uploads/2020/03/working-from-home-1024x683.jpg" alt="work-from-home" width="660" height="440" class="aligncenter wp-image-2454 size-large" srcset="https://www.vector-networks.com/blog/wp-content/uploads/2020/03/working-from-home-1024x683.jpg 1024w, https://www.vector-networks.com/blog/wp-content/uploads/2020/03/working-from-home-300x200.jpg 300w, https://www.vector-networks.com/blog/wp-content/uploads/2020/03/working-from-home-768x512.jpg 768w" sizes="(max-width: 660px) 100vw, 660px" /></a></h4>
<h4><b>Assess Employees&#8217; Remote Workspace<br />
</b></h4>
<p>At this point in time, you do not know if employees have laptops or computers at home to work remotely. Therefore, distribute a survey asking about available workspace, laptops, and internet connection. Use the results to determine the costs of getting every employee properly set up at home. Adjust your budget and prepare for purchasing in bulk. Purchases may include, but not limited to, laptops, mice, desks and chairs.</p>
<p>Further, look into an <a href="https://www.vizor.cloud/blog/what-is-it-asset-management/" target="_blank" rel="noopener">IT Asset Management tool</a> to keep track of the devices owned by the organization and who is using what.</p>
<h4></h4>
<h4><b>Set up Remote Control</b></h4>
<p>Then, invest in a Remote Control solution. This provides remote support for employees. Further, it enables employees to connect to PC&#8217;s back in the office. Thus, reducing the cost of purchasing take-home laptops.</p>
<p>It also limits the number of new processes to connect every remote device to the network.</p>
<p><span lang="EN-GB">There are many free solutions, like TeamViewer, to highly secure enterprise options, like <a href="https://www.vector-networks.com/pcduo/remote-workers/" target="_blank" rel="noopener">PC-Duo Remote Control</a>. </span></p>
<h4></h4>
<p>Regardless novel viruses, here are a few reasons to offer the option for remote work:</p>
<ol>
<li>1. Eliminate fear amongst employees</li>
<li>2. Reduce the chances of employees getting sick</li>
<li>3. Give parents the ability to be with their children if schools and daycares are closed</li>
<li>4. Let employees focus on work and not on the risks of catching the virus</li>
</ol>
<p>&nbsp;</p>
<h4><b>Plan for Video meetings</b></h4>
<p>A good way to keep people connected is through meetings. It is likely you may already use a video conferencing tool like Zoom, Skype or Go2Meeting. However, take it to the next step and make video meetings mandatory. This encourages meeting attendees to participate in the call and concentrate on the discussions.</p>
<h4><a href="https://www.vector-networks.com/blog/wp-content/uploads/2020/03/man-woman-video-chat.jpg"><img decoding="async" loading="lazy" src="https://www.vector-networks.com/blog/wp-content/uploads/2020/03/man-woman-video-chat-1024x683.jpg" alt="video-meeting" width="660" height="440" class="aligncenter wp-image-2456 size-large" srcset="https://www.vector-networks.com/blog/wp-content/uploads/2020/03/man-woman-video-chat-1024x683.jpg 1024w, https://www.vector-networks.com/blog/wp-content/uploads/2020/03/man-woman-video-chat-300x200.jpg 300w, https://www.vector-networks.com/blog/wp-content/uploads/2020/03/man-woman-video-chat-768x512.jpg 768w" sizes="(max-width: 660px) 100vw, 660px" /></a></h4>
<h4><b>Don’t Break Communication</b></h4>
<p>With remote work, more energy needs to be put into communication. Set weekly or daily virtual meetings that would normally take place in person. Then, assess if more meetings are required. Also, get the entire team to use communication applications like Microsoft’s Teams, Google’s Hangout Chats, Skype or Slack. As a result, every employee can communicate with one another without breaks in communication.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Can IoT Improve Your Quality of Life?</title>
		<link>https://www.vector-networks.com/blog/can-iot-improve-your-quality-of-life</link>
		
		<dc:creator><![CDATA[Laura Lepore]]></dc:creator>
		<pubDate>Wed, 10 Jul 2019 17:45:52 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[IoT]]></category>
		<guid isPermaLink="false">https://www.vector-networks.com/blog/?p=2429</guid>

					<description><![CDATA[This is the second and last part of Vector Networks attending the IT Connect Conference. If you missed the first article, click here. The article below also includes parts of an interview with René Breyel, co-founder of AIoT Canada. A few years ago, a company called Smarter released the iKettle – a smart kettle. The &#8230; <a href="https://www.vector-networks.com/blog/can-iot-improve-your-quality-of-life" class="more-link">Continue reading <span class="screen-reader-text">Can IoT Improve Your Quality of Life?</span></a>]]></description>
										<content:encoded><![CDATA[<p><i>This is the second and last part of Vector Networks attending the IT Connect Conference. If you missed the first article, <a href="https://www.vector-networks.com/blog/has-a-cyber-attack-affected-your-business-yet" target="_blank" rel="noopener">click here.</a> The article below also includes parts of an interview with René Breyel, co-founder of AIoT Canada.</i></p>
<p>A few years ago, a company called <i>Smarter</i> released the iKettle – a <i>smart</i> kettle. The <span><a href="https://smarter.am/ikettle/">iKettle</a></span> is connected to the Internet via Wi-Fi and can be controlled from an APP installed on your smartphone. You can program your iKettle to start every morning, so you don’t have to do it yourself every day.</p>
<p>Pen Test Partners took an interest in the device and ran a few tests. More specifically, they tested to see if they could hack into the Wi-Fi networks of those who owned an iKettle. Shockingly, <span><a href="https://www.pentestpartners.com/security-blog/finding-wireless-kettles-with-social-networks/">they succeeded</a></span>. The image below is a map of the locations of the iKettles in London at the time of this study.</p>
<p>&nbsp;</p>
<figure id="attachment_2431" aria-describedby="caption-attachment-2431" style="width: 647px" class="wp-caption alignleft"><a href="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20195.jpg"><img decoding="async" loading="lazy" src="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20195.jpg" alt="Can IoT Improve Your Quality of Life?" width="647" height="361" class="wp-image-2431 " srcset="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20195.jpg 538w, https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20195-300x167.jpg 300w" sizes="(max-width: 647px) 100vw, 647px" /></a><figcaption id="caption-attachment-2431" class="wp-caption-text"><em>Image retrieved from: https://www.theregister.co.uk/2015/10/19/bods_brew_ikettle_20_hack_plot_vulnerable_london_pots/</em></figcaption></figure>
<p>&nbsp;</p>
<h3>What does this mean?</h3>
<p>The iKettle did not have proper security measures. And so, the adorable birthday present Sally bought herself became an <span><a href="https://splinternews.com/a-new-smart-kettle-can-be-easily-hacked-to-take-over-yo-1793851911">entry point for hackers</a></span> to access her Wi-Fi network. Hacking a network can include, but not limited to providing hackers with the ability to do one of the following:</p>
<ul>
<li>Changing your Wi-Fi password</li>
<li>Controlling other devices connected to that Wi-Fi network, like a smart TV or a cellphone</li>
<li>Finding out the location of your iKettle – most likely where you live</li>
<li>Using the above to find out other information about you – and potentially stealing your identity</li>
</ul>
<p>&nbsp;</p>
<p>The iKettle is a great example of the vulnerability of an IoT device. If you are unfamiliar with the term IoT, or the “Internet of Things”, it is a concept where any physical object can be connected to the Network to send information and generate valuable insight through the use of smart software, cloud applications or various level of artificial intelligence. This concept applies to more and more devices every day and it is very likely that you have one or more of those devices already in your house like a smartwatch, a connected car, Amazon’s Alexa, a Google Home, a smart TV, an internet-enabled appliance, etc. However, you probably never thought they could pose a threat.</p>
<p>&nbsp;</p>
<h3><b>IoT cyber threats for consumers</b></h3>
<p>As we become more reliant on these devices, it may not be surprising that the number of IoT devices is expected <span><a href="https://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/The-hidden-dangers-of-IoT-devices">to reach over 28 billion</a></span> by 2022. Unfortunately, as the number of connected devices increase, there will be an increase in cyberattacks as well.</p>
<p>The primary issue is the lack of regulations for securing devices. There are some minimal standards of <span><a href="https://www.cnet.com/news/smart-tea-kettle-home-wi-fi-security-hot-water/">security that the government</a></span> of the United States wants to impose. The Canadian government also wants to intervene as they are acknowledging the growth of cybersecurity threats as over half of Canadian households have <span><a href="https://gowlingwlg.com/en/insights-resources/articles/2018/smart-toys-and-regulating-the-iot-in-canada/">over four connected devices</a></span> serving as potential targets.</p>
<p>René Breyel, the co-founder of AIoT Canada, explained that products are evolving too quickly, and businesses aren’t going to slow down this commercial Eldorado to reassure proper security measures. It takes time and resources, that most companies don’t have, to properly secure these IoT devices. But the biggest reason they aren’t spending the time to ensure security is that consumers, or users, are not yet asking for more secure products, mostly because they are not aware of the threats.</p>
<p>Breyel continued to explain that, as consumers, we are not properly managing IoT devices. You would not leave your computer password on a post-it attached to your computer. You would not sell your cellphone without wiping out the data. You would not make a bank transfer while you’re connected to the Wi-Fi at your local café. Therefore, why would you purchase and connect to your home network an IoT device that you aren’t sure is secure?</p>
<p>Consumers view these products as a convenience but are they worth the threat?</p>
<h3><b>IoT for companies</b></h3>
<p>IoT affects companies in multiple ways as well. In one way, IoT attacks are also directed to businesses. <span><a href="https://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/The-hidden-dangers-of-IoT-devices">The Mirai botnet attack</a></span> of 2016 attacked over 100,000 poorly secured IoT devices and ended up taking down websites like Twitter, Netflix, Amazon, and CNN.</p>
<p>Another way IoT affects companies is if they should explore the possibility of including IoT as part of their business strategy. Is there a specific industry IoT can benefit? Is there a certain type of product it can benefit?  Can it make workflows more efficient? Should it be introduced at all?</p>
<p>René Breyel works with companies to determine whether IoT could improve internal efficiency and add value to their customers. He pointed out that not all markets are ready for smart devices or IoT-related processes. It’s important to manage the risk versus the benefits of the data generated by the object. In other words, what is the risk if we introduce IoT versus what is the downside of not being smart and connected?</p>
<p>Breyel emphasized that IoT, in the end, must generate benefits and clear added value for the company. He developed a very clear step by step process to help companies evaluate and decide if and how to introduce IoT. Before considering technologies, it always includes an assessment of current business processes and understanding of customer objectives. Breyel emphasized the importance of including the customers&#8217; opinion and feedback from the beginning of the process. For more information on how he can help your business, you can contact him directly at <u>rene@aiotcanada.ca </u></p>
<h3><b>Case Study</b></h3>
<p>The <span><a href="https://www.xignal.com/">connected mousetrap</a></span> provides around the clock trap surveillance with real-time trap status. Status of mouse and rat traps include: armed, unarmed or unarmed with a catch. You can place traps thousands of feet away with long-range wireless sensors and receive text and email notifications when there’s activity around the trap. This could prevent costly issues with timely alerts that provide early warnings of infestation problems.</p>
<p>The system is invaluable for collecting data on the efficacy of rodent control strategies, giving a spatial distribution of catches and patterns in rodent activity. Trends can then be linked to events in the food facility that may be inadvertently encouraging the rodent pest population, such as the arrival of a particular delivery, pinpointing the rodent problem and aiding in a solution.</p>
<p>Simple solutions like that could transform the business model of Pest control companies, migrating from a role of technician schedule operator to an advanced data analytics service provider, able to advise and prevent the problem at the source.</p>
<h3><b>Conclusion</b></h3>
<p>I am happy to announce that the new version 3 of the iKettle is now safe to use, that governments are getting involved in cybersecurity and that there is potential for IoT to help companies make money. What are your thoughts on IoT? Cybersecurity?</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Has a cyber attack affected your business…yet?</title>
		<link>https://www.vector-networks.com/blog/has-a-cyber-attack-affected-your-business-yet</link>
		
		<dc:creator><![CDATA[Laura Lepore]]></dc:creator>
		<pubDate>Thu, 04 Jul 2019 17:18:25 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<guid isPermaLink="false">https://www.vector-networks.com/blog/?p=2419</guid>

					<description><![CDATA[Last month, Vector Networks attended the IT Connect Conference at Champlain College in Lambert, Montreal. This year’s topic was Cybersecurity – a topic that is affecting more than the average IT technician. &#160; In 2016, Oath announced that one billion Yahoo user accounts were hacked. In 2017, over 140 million people were affected by the &#8230; <a href="https://www.vector-networks.com/blog/has-a-cyber-attack-affected-your-business-yet" class="more-link">Continue reading <span class="screen-reader-text">Has a cyber attack affected your business…yet?</span></a>]]></description>
										<content:encoded><![CDATA[<p>Last month, Vector Networks attended the IT Connect Conference at Champlain College in Lambert, Montreal. This year’s topic was Cybersecurity – a topic that is affecting more than the average IT technician.</p>
<p>&nbsp;</p>
<p>In 2016, <span><a href="https://www.oath.com/press/yahoo-provides-notice-to-additional-users-affected-by-previously/" target="_blank" rel="noopener">Oath announced</a></span> that one billion Yahoo user accounts were hacked.</p>
<p>In 2017, over 140 million people were affected by the <span><a href="https://www.varonis.com/blog/cybersecurity-statistics/" target="_blank" rel="noopener">Equifax Breach</a></span>.</p>
<p>In 2018, <span><a href="http://investor.underarmour.com/news-releases/news-release-details/under-armour-notifies-myfitnesspal-users-data-security-issue?ReleaseID=1062368" target="_blank" rel="noopener">Under Armor’s app</a></span>, MyFitnessPal, was attacked, leaking information of approximately 150 million users.</p>
<p>In January 2019 alone, there were over <span><a href="https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-january-2019-1769185063-records-leaked" target="_blank" rel="noopener">one billion records leaked</a></span> from cyber attacks and data breaches.</p>
<p>There has been no shortage of data breaches, malware attacks, phishing emails and any cyber attack you can think of. By the end of this year, on a global scale, cybercrime is expected to cost <span><a href="https://thebestvpn.com/cyber-security-statistics-2019/" target="_blank" rel="noopener">more than $2 trillion</a></span>.</p>
<p>Cybersecurity is clearly a growing concern that cannot be ignored. As a result, Vector Networks decided to learn more about the subject by attending <span><a href="https://champlainconted.com/events/it-connect" target="_blank" rel="noopener">IT Connect 2019</a></span>. There were well over a dozen presentations at the conference, but our team focused on two areas of interests including the Canadian Cybersecurity Strategy, and IoT Security. This is part one of a two-part series on what we learned at the IT Connect conference.</p>
<p>&nbsp;</p>
<h3><b>Canadian Cybersecurity Strategy</b></h3>
<h5><b></b><i>Presented by Véronique Ménard from the Canadian Center for Cyber Security</i><b></b></h5>
<p>&nbsp;</p>
<p>The government is concerned with any critical infrastructure that may cause major disruption to its citizens. This can include a major reduction of food, water, and now, the increasing concern for cybersecurity.  As a result of major technology shifts, the federal government introduced a <span><a href="https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ntnl-cbr-scrt-strtg/index-en.aspx" target="_blank" rel="noopener">National Cyber Security Strategy</a></span> that will fund the Canadian Center for Cyber Security. It has already allocated <span><a href="https://www.canada.ca/en/public-safety-canada/news/2018/06/new-cyber-security-strategy-bolsters-cyber-safety-innovation-and-prosperity.html" target="_blank" rel="noopener">$507.7M over five years starting in 2018 and $108.8M</a></span> per year every year after that.</p>
<p>&nbsp;</p>
<figure id="attachment_2421" aria-describedby="caption-attachment-2421" style="width: 660px" class="wp-caption aligncenter"><a href="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20191.jpg"><img decoding="async" loading="lazy" src="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20191-1024x768.jpg" alt="Has a cyber attack affected your business…yet?" width="660" height="495" class="wp-image-2421 size-large" srcset="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20191-1024x768.jpg 1024w, https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20191-300x225.jpg 300w, https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20191-768x576.jpg 768w, https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20191.jpg 1152w" sizes="(max-width: 660px) 100vw, 660px" /></a><figcaption id="caption-attachment-2421" class="wp-caption-text"><em>Photo of the Canadian National Cybersecurity Strategy</em></figcaption></figure>
<p>&nbsp;</p>
<p>The Cyber Security center will use the funds to execute four main roles. It includes informing Canadians about cybersecurity matters; providing Canadians with advice, guidance, and assistance on cybersecurity; defending cyber systems, and leading the government&#8217;s response to any cybersecurity events. The organization also partners up with critical infrastructure enterprises to help better protect Canadians.</p>
<p>Véronique Ménard explained that on a global scale, Canadians spend the most time online with about 43.5 hours per month. She continued to express that cybersecurity cost the Canadian economy around $1.7 billion in 2018 alone. Here are two publications from the Canadian Center for Cyber Security for better insight on the current cyber threats.</p>
<p>The first evaluated the national cyber threat against organizations and citizens, identifying how Canadians and their businesses are currently being cyberattacked. It was discovered that 85% of Canadian businesses were the victim of a phishing attack in 2018 and, in the same year, 19%  of them revealed they were a victim of <span><a href="https://searchsecurity.techtarget.com/definition/ransomware" target="_blank" rel="noopener">ransomware</a></span>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<figure id="attachment_2424" aria-describedby="caption-attachment-2424" style="width: 660px" class="wp-caption alignnone"><a href="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20192.jpeg"><img decoding="async" loading="lazy" src="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20192-1024x768.jpeg" alt="Has a cyber attack affected your business…yet?" width="660" height="495" class="wp-image-2424 size-large" srcset="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20192-1024x768.jpeg 1024w, https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20192-300x225.jpeg 300w, https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20192-768x576.jpeg 768w, https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20192.jpeg 1152w" sizes="(max-width: 660px) 100vw, 660px" /></a><figcaption id="caption-attachment-2424" class="wp-caption-text"><em>Photo summary of the first publication in discussion</em></figcaption></figure>
<figure id="attachment_2423" aria-describedby="caption-attachment-2423" style="width: 660px" class="wp-caption aligncenter"><a href="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20193.jpeg"><img decoding="async" loading="lazy" src="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20193-1024x768.jpeg" alt="Has a cyber attack affected your business…yet?" width="660" height="495" class="wp-image-2423 size-large" srcset="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20193-1024x768.jpeg 1024w, https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20193-300x225.jpeg 300w, https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20193-768x576.jpeg 768w, https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20193.jpeg 1152w" sizes="(max-width: 660px) 100vw, 660px" /></a><figcaption id="caption-attachment-2423" class="wp-caption-text"><em>Photo summary of how cyber attacks are affecting individuals</em></figcaption></figure>
<p>&nbsp;</p>
<p>The second publication aimed to identify what may be harming the integrity of elections in Canada. Ménard highlighted election manipulation through social media. The study revealed that voters have never been more influenced by social media than today. On the other hand, the continued use of paper ballots has helped keep minimalize threats in comparison to using electronic voting machines.</p>
<p>&nbsp;</p>
<figure id="attachment_2422" aria-describedby="caption-attachment-2422" style="width: 660px" class="wp-caption aligncenter"><a href="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20194.jpeg"><img decoding="async" loading="lazy" src="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20194-1024x768.jpeg" alt="Has a cyber attack affected your business…yet?" width="660" height="495" class="wp-image-2422 size-large" srcset="https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20194-1024x768.jpeg 1024w, https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20194-300x225.jpeg 300w, https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20194-768x576.jpeg 768w, https://www.vector-networks.com/blog/wp-content/uploads/2019/07/ITC20194.jpeg 1152w" sizes="(max-width: 660px) 100vw, 660px" /></a><figcaption id="caption-attachment-2422" class="wp-caption-text"><em>Photo of the second publication in discussion</em></figcaption></figure>
<h3></h3>
<h3><b>Conclusion</b></h3>
<p>The newly formed Canadian security unit is in its infancy, but we are interested to learn more about their studies and what they will reveal. For example, how do they plan on protecting <i>connected</i> devices in hospitals, or airplane control towers, or how to prevent the manipulation of traffic lights? Will there be regulations for software products? Will they introduce a cybersecurity label certifying products?</p>
<p>Overall, as a business in Canada, Vector Networks is reassured to know the Canadian government is acting against cybercrimes. Cybersecurity cannot be overcome by a single business or individual. In a large scale study of 4000 organizations, it was revealed that 70% of <span><a href="https://thebestvpn.com/cyber-security-statistics-2019/" target="_blank" rel="noopener">businesses are not prepared</a></span> for a cyber attack. <span><a href="https://thebestvpn.com/cyber-security-statistics-2019/" target="_blank" rel="noopener">Another study</a></span> revealed that 71% of Americans were scared their personal information would be hacked. Whether you are an individual or business, <span><a href="https://www.canada.ca/en/employment-social-development/corporate/portfolio/service-canada.html" target="_blank" rel="noopener">here are some resources</a></span> to help you strengthen your cybersecurity.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why Vector Networks Hosted IT Vision Conference 2018</title>
		<link>https://www.vector-networks.com/blog/why-it-vision-conference-2018/</link>
		
		<dc:creator><![CDATA[CB]]></dc:creator>
		<pubDate>Thu, 24 Jan 2019 20:39:46 +0000</pubDate>
				<category><![CDATA[Company]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Business Strategy]]></category>
		<category><![CDATA[Chatbots]]></category>
		<category><![CDATA[congference]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data collection]]></category>
		<category><![CDATA[IT Vision]]></category>
		<category><![CDATA[Machine LEarning]]></category>
		<category><![CDATA[ML]]></category>
		<guid isPermaLink="false">http://www.vector-networks.com/blog/?p=2403</guid>

					<description><![CDATA[On November 9th 2018, Vector Networks hosted a business and technology conference, IT Vision 2018, at Palais des congrès de Montréal How It All Started At the beginning of 2018, while reviewing our yearly goals and initiatives, it was decided that we wanted to better serve our customers, who work in IT, by informing ourselves &#8230; <a href="https://www.vector-networks.com/blog/why-it-vision-conference-2018/" class="more-link">Continue reading <span class="screen-reader-text">Why Vector Networks Hosted IT Vision Conference 2018</span></a>]]></description>
										<content:encoded><![CDATA[<div class="wordpress-content-section">
<h3>On November 9<sup>th </sup>2018, Vector Networks hosted a business and technology conference, IT Vision 2018, at <a href="http://congresmtl.com/en/" ping="/url?sa=t&amp;source=web&amp;rct=j&amp;url=http://congresmtl.com/en/&amp;ved=2ahUKEwj8k9vCoofgAhWliOAKHeKwAigQFjAAegQIABAD"></a>Palais des congrès de Montréal</h3>
<p><strong><span lang="EN-US">How It All Started</span></strong><br />
<span lang="EN-US">At the beginning of 2018, while reviewing our yearly goals and initiatives, it was decided that we wanted to better serve our customers, who work in IT, by informing ourselves on how they will adopt emerging technology, like Machine Learning and IoT, in their workplace. That way we can evolve our products and services to their changing needs. </span></p>
<p><span lang="EN-US">With that in mind, we sought a conference that addressed how IT professionals are currently preparing for emerging technology- whether it be how to communicate with C-Levels about the benefits of the technology or how to adapt their roles to new processes. We figured, if organizations are adopting more technology in their practices, they should also be preparing their employees that will be responsible for it- the IT departments. Right</span><span lang="EN-US">?</span></p>
<p><span lang="EN-US">To our dismay, we found many conferences that focused on connecting IT buyers and vendors, but none that discussed what organizations need to do to evolve their business strategy, employees and processes for emerging technology, in the region of Montreal. Therefore, instead of relying on another conference, we decided to host our own conference that would answer all our questions- and ultimately everyone else’s.</span></p>
<p><strong><span lang="EN-US">The Planning Phase</span></strong><br />
<span lang="EN-US">There were a lot of things to do and a lot of decisions to make, but there were two things we knew for sure: 1) We did not want any of the speakers to be a vendor selling a product or service, and 2) We had to decide what <i>technology</i> to focus on- we couldn’t talk about ALL technology. </span></p>
<p><span lang="EN-US">As you may already know, we chose to focus on Artificial Intelligence for IT Vision 2018. Montreal has quickly become the AI hub of the world, <a href="https://www.forbes.com/sites/peterhigh/2017/11/06/why-montreal-has-emerged-as-an-artificial-intelligence-powerhouse/#4a627a3523bd" target="_blank" rel="noopener">i<u>nspiring thousands of researchers to flock to the city. The government is funding millions of dollars to AI research and there’s increasing talent in tech in Montreal. We would be foolish not to choose AI! </u></a></span></p>
<p><strong><span lang="EN-US">The Development Phase</span></strong><br />
<span lang="EN-US">As technology is changing the way we do business, it is not possible to discuss business strategy without talking about a technology strategy. Therefore, we knew the conference would help identify what parts of AI that organizations can most benefit from <i>and</i> would help researchers/tech enthusiasts clarify their value to their employers. </span></p>
<p><span lang="EN-US">To complement both the business and technology sides of the conference, we had a great combination of AI Scientists, business founders, leaders in AI and researchers</span><span lang="EN-US"> discussing topics they think will help attendees the most. <a href="http://www.itvision.vector-networks.com/" target="_blank" rel="noopener">See the website here</a>.</span></p>
<p><strong><span lang="EN-US">Presentation Titles &amp; Links:<br />
</span></strong><yt-formatted-string force-default-style="" class="style-scope ytd-video-primary-info-renderer"></yt-formatted-string><yt-formatted-string force-default-style="" class="style-scope ytd-video-primary-info-renderer"><span><yt-formatted-string force-default-style="" class="style-scope ytd-video-primary-info-renderer"></yt-formatted-string><a href="https://youtu.be/8kwh4hxiIAs" target="_blank" rel="noopener">Thriving in the Knowledge Base by Nectarios Economakis</a><br />
<a href="https://youtu.be/ya-z2hjSTAI" target="_blank" rel="noopener">Designing The Future by Dr. Joel Martin</a><br />
<a href="https://youtu.be/shFIUCHBmZc" target="_blank" rel="noopener">Adjusting Your Business To An AI Future &#8211; Panel Discussion with Caroline Pernelle, Julie Hubert, Caroline Bessega &amp; Gabriel Garcia-Curiel</a><br />
<a href="https://youtu.be/ItxLtVl3CgE" target="_blank" rel="noopener">Managing Your Organization&#8217;s Knowledge by René Witte &amp; Bahar Sateli</a></span></yt-formatted-string></p>
<p><strong><span lang="EN-US">Oh, those other conferences</span></strong><br />
<span lang="EN-US">I didn’t mention before, but there were notable characteristics we didn’t want in our conference that I think are worth mentioning. Firstly, we wanted to make it affordable, so <i>entire</i> teams can attend the conference without breaking the budget. Think of the last conference you attended. Did it cost as much as a luxurious vacation? </span></p>
<p><span lang="EN-US">Second, we wanted to work with partners who shared similar values. This includes providing value and a delightful experience. With a little bit of work, we partnered with amazing organizations in Montreal including and not limited to Desjardins, Montreal International, and LG6 who have helped us with IT Vision.</span></p>
<p><span lang="EN-US">Finally, we did not want to hold a conference of 1000 people where half of the attendees are confused and the other half are swamped with pamphlets. We wanted to hold an intimate gathering, so more people can ask questions and get the information they came for. The networking hours are not dedicated to lineups at the washroom. The intimate setting encouraged collaborations and friendships.</span></p>
<p><strong><span lang="EN-US">Last Remarks </span></strong><br />
<span lang="EN-US">Vector Networks is proud to host a conference with such dedicated speakers, partners, and team. We hope everyone learns, collaborates and has fun so we can do this again next year!</span></p>
<p><span lang="EN-US">If you have any questions about IT Vision 2018 and upcoming events, contact Laura at marketing@vector-networks.com</span></p>
</div>
<p><a href="https://youtu.be/bOvR145FJ6g" target="_blank" rel="noopener">View summary video here</a></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Shadow IT &#038; Managing SaaS Spend</title>
		<link>https://www.vector-networks.com/blog/shadow-it-managing-saas-spend</link>
		
		<dc:creator><![CDATA[Emma Kula]]></dc:creator>
		<pubDate>Wed, 21 Jun 2017 14:26:06 +0000</pubDate>
				<category><![CDATA[Cloud stuff]]></category>
		<category><![CDATA[SaaS]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.vector-networks.com/blog/?p=2349</guid>

					<description><![CDATA[We’ve explained shadow IT briefly in a previous blog post, but we now want to dig deeper into the issue and demonstrate how it can affect your organization. Many employees have the tendency to sign up for online cloud tools right when they need them, as it is seemingly a quick and painless solution for &#8230; <a href="https://www.vector-networks.com/blog/shadow-it-managing-saas-spend" class="more-link">Continue reading <span class="screen-reader-text">Shadow IT &#038; Managing SaaS Spend</span></a>]]></description>
										<content:encoded><![CDATA[<p>We’ve explained shadow IT briefly in a <a href="http://www.vector-networks.com/blog/basics-shadow-IT">previous blog post</a>, but we now want to dig deeper into the issue and demonstrate how it can affect your organization.</p>
<p>Many employees have the tendency to sign up for online cloud tools right when they need them, as it is seemingly a quick and painless solution for whichever problem they are facing. Informing managers and the IT department is often secondary, as this step tends to slow down the process and keep employees waiting for a tool they need at that moment.</p>
<p>Although this may seem like the easiest way, it can cause potential security and compliance issues. Shadow IT occurs when employees sign up for online cloud services without the authorization of IT, and this is no small problem – in fact, 83% of CIOs have reported having unauthorized cloud provisioning within their organization. Shadow IT causes security risks from data being stored on unauthorized cloud servers, and causes money to get wasted due to lack of visibility and accountability. On top of these issues, IT is tasked with supporting an ever-growing combination of unknown configurations and services.</p>
<p>Having a system in place to manage the process around approval and provisioning of cloud services is the best way to control shadow IT, while empowering end users to meet the ever-changing demands of the business. Using a software request portal ensures that all application requests pass through multi-layered approvals and enables automatic provisioning right after approval. In addition to managing requests and approvals, Vizor&#8217;s Cloud discovery functionality monitors financial transactions so software purchases can firstly be discovered and then managed. Vizor also has specific functionality for auto-renewing SaaS subscriptions and reporting recurring costs at department and per employee levels.</p>
<p>Properly managing SaaS requests and cloud software expenditure can save your organization a significant amount of money and reduce risk. Make sure you are not at risk of shadow IT and take advantage of a system that can make it significantly easier.</p>
<p><a href="http://www.vector-networks.com/blog/shadow-it-managing-saas-spend-video">Watch the shadow IT &amp; SaaS spend video HERE!</a><br />
<p class="text-center">
	<b>
		Struggling to manage Cloud Apps?
	</b>
</p>
<p class="text-center"><a class="btn btn-base btn-lg btn-pill" style="color: white; width: 280px;" href="/it-asset-management/ITAM-SAM-SAAS/vizor-saas-cloud-subscription-management.html">Learn about VIZOR</a></p><!-- --></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Shadow IT &#038; Managing SaaS Spend</title>
		<link>https://www.vector-networks.com/blog/shadow-it-managing-saas-spend-video</link>
		
		<dc:creator><![CDATA[Emma Kula]]></dc:creator>
		<pubDate>Wed, 21 Jun 2017 12:31:48 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">http://www.vector-networks.com/blog/?p=2374</guid>

					<description><![CDATA[Many employees have the tendency to sign up for online cloud tools right when they need them, as it is seemingly a quick and painless solution for whichever problem they are facing. However, leaving IT authorization out can cause potential security and compliance issues. Here is how shadow IT and SaaS spending can affect your &#8230; <a href="https://www.vector-networks.com/blog/shadow-it-managing-saas-spend-video" class="more-link">Continue reading <span class="screen-reader-text">Shadow IT &#038; Managing SaaS Spend</span></a>]]></description>
										<content:encoded><![CDATA[<p>Many employees have the tendency to sign up for online cloud tools right when they need them, as it is seemingly a quick and painless solution for whichever problem they are facing. However, leaving IT authorization out can cause potential security and compliance issues. Here is how shadow IT and SaaS spending can affect your organization.</p>
<div class="embed-responsive embed-responsive-16by9">
    <iframe class="embed-responsive-item" src="https://www.youtube.com/embed/UsmlTpSiqHA?rel=0"></iframe>
</div>
<p>2:09 &#8211; Recorded 21 June 2017</p>
<p><a href="http://www.vector-networks.com/blog/shadow-it-managing-saas-spend">Read the full blog post here.</a><br />
<p class="text-center">
	<b>
		Struggling to manage Cloud Apps?
	</b>
</p>
<p class="text-center"><a class="btn btn-base btn-lg btn-pill" style="color: white; width: 280px;" href="/it-asset-management/ITAM-SAM-SAAS/vizor-saas-cloud-subscription-management.html">Learn about VIZOR</a></p><!-- --></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Infographic: 5 Best Practices for Software Asset Management</title>
		<link>https://www.vector-networks.com/blog/infographic-5-best-practices-for-software-asset-management/</link>
		
		<dc:creator><![CDATA[Emma Kula]]></dc:creator>
		<pubDate>Wed, 10 May 2017 18:00:03 +0000</pubDate>
				<category><![CDATA[Infographics]]></category>
		<category><![CDATA[Software Asset Management]]></category>
		<guid isPermaLink="false">http://www.vector-networks.com/blog/?p=2083</guid>

					<description><![CDATA[Software Asset Management may sound intimidating or complicated, but it does not have to be. We want to help provide your organization and its managers with all the necessary tools to implement a successful SAM program that will save you time, money and stress in the long run. To get started, you can take a &#8230; <a href="https://www.vector-networks.com/blog/infographic-5-best-practices-for-software-asset-management/" class="more-link">Continue reading <span class="screen-reader-text">Infographic: 5 Best Practices for Software Asset Management</span></a>]]></description>
										<content:encoded><![CDATA[<p>Software Asset Management may sound intimidating or complicated, but it does not have to be.<br />
We want to help provide your organization and its managers with all the necessary tools to implement a successful SAM program that will save you time, money and stress in the long run.</p>
<p>To get started, you can take a look at our infographic below with the 5 &#8220;best practices&#8221; for a software asset management program. For a more in-depth outline, download our <a href="http://www.vector-networks.com/action/campaign.php?p=sam-ebook&#038;c=blog-sam-infograph" target="_blank">FREE eBook here</a> and get everything you need to know for getting started with and implementing SAM. The eBook explains all necessary elements of a SAM program and important terminology, plus provides tips for crucial processes like software lifecycle management, license recycling and audit preparation.</p>
<p><a href="http://www.vector-networks.com/blog/wp-content/uploads/2017/05/5-Best-Practices-SAM-Infographic.png"><img decoding="async" loading="lazy" src="http://www.vector-networks.com/blog/wp-content/uploads/2017/05/5-Best-Practices-SAM-Infographic.png" alt="5 Best Practices SAM Infographic" width="800" height="2000" class="alignnone size-full wp-image-2084" srcset="https://www.vector-networks.com/blog/wp-content/uploads/2017/05/5-Best-Practices-SAM-Infographic.png 800w, https://www.vector-networks.com/blog/wp-content/uploads/2017/05/5-Best-Practices-SAM-Infographic-120x300.png 120w, https://www.vector-networks.com/blog/wp-content/uploads/2017/05/5-Best-Practices-SAM-Infographic-410x1024.png 410w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p><strong><a href="http://www.vector-networks.com/action/campaign.php?p=sam-ebook&#038;c=blog-sam-infograph" target="_blank">CLICK HERE</a> to download the eBook &#8220;Getting Started with Software Asset Management&#8221; right now!</strong><br />
<p class="text-center">
	<b>
		Do you need a tool to manage Software Licenses?
	</b>
</p>
<p class="text-center"><a class="btn btn-base btn-pill btn-lg" style="color: white; width: 280px;" href="https://www.vizor.cloud/software-license-management/?utm_source=v-n-blog&utm_medium=internal&utm_campaign=redirect&utm_content=samblogbutton">Learn about VIZOR</a></p>
	
	<p class="text-center"><a class="btn btn-alt btn-pill btn-lg" style="color: white; width: 280px;" href="https://www.vizor.cloud/sam/?utm_source=v-n-blog&utm_medium=internal&utm_campaign=redirect&utm_content=samblogbutton">Try VIZOR Now</a></p><!-- --></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Justify Your IT Asset Management (ITAM) Investment</title>
		<link>https://www.vector-networks.com/blog/how-to-justify-your-it-asset-management-investment</link>
		
		<dc:creator><![CDATA[Emma Kula]]></dc:creator>
		<pubDate>Tue, 18 Apr 2017 18:09:30 +0000</pubDate>
				<category><![CDATA[IT Asset Management]]></category>
		<guid isPermaLink="false">http://www.vector-networks.com/blog/?p=2038</guid>

					<description><![CDATA[Developing an IT asset management program is no small task. It requires a significant amount of investment, time and dedication, so some organizations may be intimidated to begin or have trouble getting funding from management. Here we will provide a short outline of the top five ways to justify an investment in ITAM and see ROI. &#8230; <a href="https://www.vector-networks.com/blog/how-to-justify-your-it-asset-management-investment" class="more-link">Continue reading <span class="screen-reader-text">How to Justify Your IT Asset Management (ITAM) Investment</span></a>]]></description>
										<content:encoded><![CDATA[<p>Developing an IT asset management program is no small task. It requires a significant amount of investment, time and dedication, so some organizations may be intimidated to begin or have trouble getting funding from management. Here we will provide a short outline of the top five ways to justify an investment in ITAM and see ROI.</p>
<h5> 1. Control lifecycle costs. </h5>
<p> An ITAM program can help your organization control and avoid certain costs associated with investments in IT assets, such as license, maintenance and other costs paid to external parties.</p>
<h5> 2. License compliance. </h5>
<p> SAM in particular, with license compliance being a part of it, helps you to ensure your organization is in compliance with license agreements. The compliance risk is driven by organizations who can charge hefty fines if they see you are out of compliance during an audit.</p>
<h5> 3. Support business functions. </h5>
<p> This includes both IT and non-IT functions. Proper ITAM provides data useful to other organizational functions such as IT planning, budgeting and change management. As for non-IT functions, finance, procurement and contract management are supported by ITAM, which facilitates the decisions in these areas in a proactive way.</p>
<h5> 4. Add value. </h5>
<p> ITAM can extract additional value from what is spent on IT assets. Improving the use of an asset, exploiting an asset’s capability and redeploying under-utilized assets are examples.</p>
<h5> 5. Reduce risks. </h5>
<p> Besides costs, some additional risks mitigated by ITAM are contract, regulatory and legislative risks. Additionally, asset tracking from ITAM is necessary in securing assets to reduce cyber security risks.</p>
<p>All in all, IT asset management has benefits that go far beyond just audit defense. Many organization are not aware of how much money they can actually save with an ITAM program, as well as the additional value and maximized ROI it brings. For your reference, there is an infographic below reiterating these points – feel free to print it out and show it to your management if they need some convincing!</p>
<p>Struggling to get ITAM investment? Download and share <a href="http://www.vector-networks.com/blog/infographic-5-reasons-to-implement-a-itam-program/">this infographic</a> with your management.</p>
<p><p class="text-center">
	<b>
		Do you need a tool to manage IT Assets?
	</b>
</p>
<p class="text-center"><a class="btn btn-base btn-pill btn-lg" style="color: white; width: 280px;" href="https://www.vizor.cloud/itam-it-asset-management/?utm_source=v-n-blog&utm_medium=internal&utm_campaign=redirect&utm_content=itamblogbutton">Learn about VIZOR</a></p>
	
<p class="text-center"><a class="btn btn-alt btn-pill btn-lg" style="color: white; width: 280px;" href="https://www.vizor.cloud/getstarted/?sol=Vizor-Assets&utm_source=v-n-blog&utm_medium=internal&utm_campaign=redirect&utm_content=itamblogbutton">Try Vizor now</a></p>
	<!-- --></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Infographic: 5 Reasons to Implement an ITAM Program</title>
		<link>https://www.vector-networks.com/blog/infographic-5-reasons-to-implement-a-itam-program/</link>
		
		<dc:creator><![CDATA[Dean Bates]]></dc:creator>
		<pubDate>Wed, 12 Apr 2017 08:39:17 +0000</pubDate>
				<category><![CDATA[Infographics]]></category>
		<category><![CDATA[IT Asset Management]]></category>
		<guid isPermaLink="false">http://www.vector-networks.com/blog/?p=2029</guid>

					<description><![CDATA[Struggling to get ITAM investment? Download and share this infographic with your management.]]></description>
										<content:encoded><![CDATA[<p>Struggling to get ITAM investment? Download and share this infographic with your management. </p>
<p><a href="http://vizor.vector-networks.com/action/request-content.php?sol=Vizor-Assets&#038;action=Infographic&#038;content=infographic-5-reasons-to-implement-a-itam-program"><img decoding="async" src="http://www.vector-networks.com/blog/wp-content/uploads/2017/04/5-reasons-you-should-use-an-ITAM-program.png"  alt="5 Reasons to implement a ITAM program" /></a></p>
<p><p class="text-center">
	<b>
		Do you need a tool to manage IT Assets?
	</b>
</p>
<p class="text-center"><a class="btn btn-base btn-pill btn-lg" style="color: white; width: 280px;" href="https://www.vizor.cloud/itam-it-asset-management/?utm_source=v-n-blog&utm_medium=internal&utm_campaign=redirect&utm_content=itamblogbutton">Learn about VIZOR</a></p>
	
<p class="text-center"><a class="btn btn-alt btn-pill btn-lg" style="color: white; width: 280px;" href="https://www.vizor.cloud/getstarted/?sol=Vizor-Assets&utm_source=v-n-blog&utm_medium=internal&utm_campaign=redirect&utm_content=itamblogbutton">Try Vizor now</a></p>
	<!-- --></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
