IT infrastructure, what we’ve all come to know and love (or hate, depending on your viewpoint) is the driving force behind all of our machines. What if it were to be so widely available that you didn’t even have to think about it when building a program? In a less dramatic sense, this is the definition behind invisible infrastructure. History Remember back in the day when personal computer commercials used to say “powered by a 6 core processor with a …

National Cyber Security Awareness Month (NCSAM) may be ending soon, but that doesn’t mean you can or should forget about cybersecurity and go back to your daily lives, right? Right. In this post, we’ll be talking about an important cybersecurity problem that has become an issue worldwide: Security (or lack thereof) of IoT devices. We’ve addressed this issue before but we think it’s worth calling out again because it is so important. Everything from your watch to your fridge can be …

The US has been hit by two major hurricanes in less than two months: Hurricane Florence hit the Carolinas and Atlantic coast on September 14 as a category 1 storm, and Hurricane Michael in the Florida panhandle on Oct. 9 as a category 4 storm. Both have caused massive flooding, killed nearly 60 people and are estimated to cause billions of dollars in damage when all is said and done. As people recover from the storms and assess their personal …

On September 25, Facebook discovered that 50 million user accounts had been compromised as a result of a vulnerability that resulted in access tokens (what’s used to keep you signed into Facebook on all your devices) being illegally accessed. During Facebook’s investigation, another 40 million users had the potential to be compromised, bringing the total to nearly 100 million users affected. It’s a security breach that’s on par with Equifax–not necessarily in terms of the number of people affected (although …

Every October, the National Security Alliance and Department of Homeland Security team up to promote National Cyber Security Awareness Month (NCSAM). With all of the recent data breaches and security attacks, (we’re looking at you, Facebook) October seems like a very appropriate month to review your security policies and heed some advice from security experts. The month has been broken down into four weeks of cybersecurity themes for the home, career, office and nation-state. For week 1, we focus on …

Now that we’ve had some time to recover from last week’s Microsoft Azure outage, we can look back and ask, “What happened?!” Microsoft has released a Root Cause Analysis (RCA) explaining the incident, but what else have we learned from the incident? Below are three key takeaways from the event. Public cloud providers aren’t immune to outages We’ve said it before and we’ll say it again, but no one is immune to downtime. It can happen to anyone, anywhere. Even with …

Will you be in the Indianapolis area this week? Be sure to check out the Indianapolis IT Symposium on September 12! It’s a great opportunity to stay on top of current technology trends, network with thousands of your peers, and share knowledge through keynote and breakout sessions. While you’re there, be sure to visit us at our table! We’d love to show you how to modernize your IT, transform your organization and grow your business with the help of our …

If you tried to catch up from Labor Day weekend by opening your Office 365 email this morning and found your computer still seemed to be in holiday mode, there’s a reason for that. According to a couple of different reports, one of Microsoft’s Texas data centers has suffered an outage due to a spike in internal temperature, causing a shutdown of servers hosted there. The shutdown was automatically initiated after local temperatures exceeded the set threshold so asto prevent …

What is ISO 27001 compliance?

Posted on August 21, 2018 by

First introduced in 2005, the ISO family of standards for managing information security has received more attention lately in the wake of increasing data breaches and security lapses. However, they’re still not as popular as HITRUST or SOC 2 audits, so in this post, we’ll specifically discuss ISO 27001, who it affects and what compliance means for your organization. What is ISO 27001? ISO 27001 is a compliance regulation such as PCI or HIPAA. There are about a dozen standards within …

When you think of a security threat, what comes to mind? A ransomware attack? A thief drilling into your vault and stealing your money? An unpatched vulnerability that could expose sensitive data? While all of these threats represent external forces, it’s just as important to remember your internal threats, too. In this post, we’ll discuss a few ways you can stay on top of insider threats to your organization’s data and reputation and take appropriate steps to protect your employees–not …

Get started now. Exceptional service awaits.

Live Chat