Ikon Blog
SAMPLE K-12 TECHNOLOGY PLAN
Don't even think about creating a technology plan before you see this!


How to Prepare Your Technology During Winter Break
With the Winter Recess upon us, now is a great time to get your school’s network ready for the second half of the school year.

Why Your School Needs an ADA Compliant Website
This is a guest blog post provided by our trusted partner Niki Jones Agency, Inc. In this modern era where the majority of the population, including

10 Steps to Creating a Technology Roadmap for Your School or District
Schools and districts are usually under budget for their IT needs. The best way to minimize IT expenditures and invest in technology wisely is to

Ransomware by the Numbers
Ransomware continues to be Public Enemy Number One in terms of IT security concerns, representing more than 60% of all malware attacks. As the threat of Ransomware

FatPipe Unleashes New Integrated VNF/SD-WAN Offering for Enterprises
*This article originally appeared on ChannelPartnersOnline.com. FatPipe Networks has unveiled an enterprise product for SD-WAN that allows for what the company says is easy deployment of network functions

INFOGRAPHIC: The Growth of Technology Expenses in Education
It’s no secret that technology use is increasing at a rapid place, and schools are under increased pressure to keep up. In turn, technology expenses

The Ultimate Test: Is Your School’s Current IT Services Provider Up to the Challenge
Finding an honest, reliable and capable IT services provider can be tricky for any organization, and especially for schools where the stakes are high and

Devices Hacked by Linux Malware
Thousands of devices have been hacked by a Linux malware named Rakos, and while researchers have yet to see any actual malicious activity involving the

iOS Security Broken with a Simple Wi-Fi Connection
Apple CEO Tim Cook announces the new iPhone 7 during an event to announce new products, in San Francisco. The blurb for a presentation at

Linksys Routers Attacked by Hijackers Via Flaws
Attackers could exploit the vulnerabilities to crash routers, extract sensitive information from them or take them over The Linksys WRT3200ACM router. Two dozen Linksys router