The new combination of CenturyLink and Level 3 has much to be thankful for this season, including a raft of awards received at the MEF17 networking conference in Orlando this week...View Post
To help save time and money, a growing number of enterprises are storing sensitive customer data in the public cloud. Increasingly, they’re also leveraging multiple cloud providers...View Post
A troubling and frequent trend I’ve witnessed involves technology decisions being made within the business units and not involving IT’s leadership. A common example is with cloud applications...View Post
CenturyLink was a Premier sponsor at this year’s Gartner Symposium/ITxpo in October. The event explores new ways of thinking and offers the trusted insights and guidance IT leaders need to lead their organization with confidence...View Post
In the demise of Elwood Adams Hardware, we can see two forces at work that may figure to change the landscape of American small businesses and entrepreneurship. There is the continuing disruptive dominance of the Internet in the commercial sphere...View Post
Throughout October, CenturyLink was active in supporting National Cybersecurity Awareness Month. As a wrap up, I would like to address how we participated in this 13-year-old tradition, with our...
WASHINGTON – CenturyLink, Inc. (NYSE: CTL) congratulates David Redl on his U.S. Senate confirmation as administrator of the National Telecommunications and Information Administration (NTIA) at...
More Americans than ever before are working from home, and it’s having a drastic impact on the American workplace. Of course, this means that fewer people are showing up to the office every day – and some businesses have adopted a “fully remote” model where there is no central office...View Post
Selling a company is serious business. For most sellers, it’s the single most important, complex and substantial transaction ever entered into. It can be overwhelming, particularly if the seller hasn’t engaged a solid, experienced advisory team to support them throughout their preparations and the transaction itself...View Post
Start the journey by increasing awareness, knowledge and conversations around IoT throughout the organization. This can be done in several ways...View Post
It’s never good news when your workloads, data, or both get hacked in a public cloud. Fortunately, it’s something that rarely occurs. But as workloads and data sets on the public clouds become more numerous, such a hack could occur...View Post
In honor of National Cyber Security Awareness Month (NCSAM), we’ve launched a new video series offering business and IT leaders insight about cybersecurity topics and challenges we often hear when we meet with customers and prospects...View Post
Nearly 40% of small businesses have exchanged their traditional hardwired phone systems for cutting-edge voice over Internet protocol (VoIP) and over 20% of small businesses depend on VoIP in the cloud, also known as Hosted VoIP...View Post
Technology is changing at breakneck speed driving collaboration and complexity at the same time. We face new cybersecurity threats even as we seek to modernize our IT infrastructure and streamline our processes...View Post
Enterprise tech disruption starts at home — literally. Change often happens in business when consumers insist that a new capability is too indispensable or convenient to give up during the day...View Post
By Tim Kelleher
Third party validation for hard work is always welcome. In this case, I’m proud and honored that our managed security services team achieved this latest milestone: CenturyLink®...
If you’re looking to keep enterprise mobile devices secure, whether they were issued by the organization or authorized under bring-your-own-device (BYOD) programs, you should consider taking a multilayered approach...View Post
Salary increases are one of the most fundamental part of an organization’s ability to attract and retain talent. It’s a tool used motivate employees, reward commitment and loyalty, and...View Post
If the Equifax breach caused 143 million U.S. consumers to have their email credentials, Social Security numbers and birth dates, plus other personal information accessible to hackers, then that...View Post