Posted by & filed under Security.

Getting your education takes a long time. Securing a home loan tends to be a longer process, as well. Both make sense and are commonly referred to as “the way it is.” What doesn’t make sense is the information that was revealed in NopSec’s 2015 State of Vulnerability Risk Management. Summed up: Remediation issues are… Read more »

Posted by & filed under Managed Services.

You’re an advertising agency. You’re a manufacturing plant. You’re a hospital. Every day you go to work, you want to do work in the fields you’ve selected because that’s what you’re passionate about and it’s what you’re good at. For this reason, many companies are moving away from simple service level agreements to deeper-level, more… Read more »

Posted by & filed under Security.

Looking back at the NCAA basketball tournament, IT executives can’t help but recognize the similarities between basketball and security.  Every team, much like your IT team, has its own style. One solution cannot possibly fit all because personnel is different, tactics are different and management is different. But, one common theme amongst the Final Four teams… Read more »

Posted by & filed under Security.

Organizations that implement the proper technology and tools will position themselves well to defend against cyber attacks and hackers. While 43% of IT executives have increased security budgets in 2015, according to an article from ComputerWorld, it’s still unclear what exactly should be implemented. Below are the steps that we recommend following. Assess the Current… Read more »

Posted by & filed under Security.

Every morning an IT professional wakes up, they face the unknown. Hackers are constantly evolving, looking for weaknesses in defense that can be easily exploited for personal gain. Insider threats are becoming more common by the day, as relationships within the workplace are in a state of flux between employee and company. Working in IT… Read more »