At Soliton, we continue to reflect on our roots. From our humble beginnings in 1979, our spirit of innovation was motivated by Kaizen (改善). Kaizen is both a tool and a mindset, and represents change for the better. It is the co...
Read More

An increasing number of cyber-attacks in recent years has paved the way for innovative solutions that provide secure mobile access to corporate resources. While stationary IT systems and laptops may often have strong security, mob...
Read More

Remote work has become the new normal, and managers must consider how to achieve zero-trust security while allowing for remote access. The zero-trust model requires authentication for all users, even those within the organization’...
Read More

blurred background with words that read live streaming, with a play arrow icon.
Businesses are finding new ways to connect with their customers. Real-time live streaming may be a great way to alert customers about sales, promotions, or to build a relationship.  Live streaming sounds complex but we promise ...
Read More

Cybersecurity protection. Protect your data from being compromised, picture is of hands on laptop and the screen is a lock.
Data breaches will rise 22%, at least, just this year alone. At this current rate of increase, the breaches will expose, at least 146 billion records of personal information by 2023. This includes your name, address, and credit ca...
Read More

pad lock securing the world. represents Web security protecting the whole globe.
When 2019 started, there were nearly 4000 data breaches in six months. This number has skyrocketed since COVID-19 related attacks have gripped the globe. If your company has never had web security issues, don’t think it can’t happ...
Read More

remote worker sitting on bed talking on cell phone with laptop in front of her. She is a remote worker for a small business, doing remote IT contract work.
4.7 million U.S. workers are remote. And this number will only increase more in response to the COVID-19 pandemic. We’re ditching the office space and letting employees work from anywhere. Many roles can be worked remotely, and...
Read More

cybersecurity attacks have peaked during covid 19 pandemic and with remote workers peaking security protocols have been reduced
It’s vital to ensure that sensitive data is separated from IT equipment and to encourage the use of secure systems for remote work, the most effective control being dual-factor authentication. The rapid shift to remote working has...
Read More

hands typing on a work laptop. Indicating that remote work can sometimes be a cybersecurity risk.
Working at home during the COVID-19 pandemic has posed a lot of new challenges for businesses and employees alike. Many of these security challenges, can create serious problems for companies of all sizes. It's easy for one of ...
Read More

black and white sign says cybersecurity
Most IT managers are aware of the major types of cybersecurity attacks. From hacking to DDOS, you may feel your company is prepared for the worst. The names we give these techniques are a different topic entirely, but the threa...
Read More