When you think of a security threat, what comes to mind? A ransomware attack? A thief drilling into your vault and stealing your money? An unpatched vulnerability that could expose sensitive data? While all of these threats represent external forces, it’s just as important to remember your internal threats, too. In this post, we’ll discuss a few ways you can stay on top of insider threats to your organization’s data and reputation and take appropriate steps to protect your employees–not …

Now that we’ve had half a year to process the Spectre and Meltdown flaws released in January, what’s been done about it? Are we now “safe” or are there other CPU flaws out there that we just don’t know about? Unfortunately, there’s always the risk of as-yet unknown vulnerabilities that could be exploited for malicious purposes. But in the meantime, security researchers and other organizations are working hard on fixes to make the Internet (and in this case, computer architecture itself) …

Whether you use a PC or a Mac, if you are like me, you must rely on Windows Explorer or the Mac Finder to visualize and search your files and data as they are stored on your computer. These tools provide a user-friendly and intuitive way to manage all types of files and documents. They allow you to create new ones, move existing ones around, delete some, rename some, search their content, view metadata describing them, or even open and …

The European General Data Protection Regulation (GDPR) will be enforced starting May 25th, 2018. That’s only 10 weeks away! Are you still scrambling to become compliant? You’re not alone. According to a survey by Solix Technologies, 22 percent of companies were still unaware they had to comply with GDPR as recently as December. The general consensus is that half of all US companies that should be compliant with GDPR by May 25 will not be. Do you need to meet …

Managing customer and employee information properly can be a daunting task for any organization, and determining whether that information should be kept on-premise or in the cloud even more so. Active Directory (AD) is one identity management tool that can help businesses in this respect. AD has had some big changes since its early inception, which we’ll talk about in this post. In the olden days of Microsoft Windows Server AD, you had a simple on-premise repository that stored a …

Two factor authentication is widely recommended as a security practice to give an extra layer of protection to your network and personal accounts, but according to security researchers, if you use SMS texts as your second form of authentication, they could be subject to interception and exploitation. Security researchers demonstrated how easily they were able to manipulate the two-factor set up on a Bitcoin wallet account, simply by intercepting the text message sent over the cellular network. Once they reset …

Cybersecurity journalist Brian Krebs noted on his website the security and simplicity of adding a vocal password to your authentication process when you call a company such as a bank or investment firm to obtain access about your account. Voice passwords are a great idea. They can be a very effective security measure if a hacker calls your bank to open a fraudulent account in your name or requests a large transfer out of your account. Most banks require only your …

Setting budgets has become a key weapon in the ongoing struggle of organizations to understand and control their cloud spend. Public cloud providers have responded by offering their users services such as budget alerts and server tagging. Users, however, still struggle to see the costs associated with the resources they’ve tagged. In this post, we’ll talk about the challenge of viewing your costs in Azure and how you can solve it. Azure offers a few different methods of grouping services: …

As the public cloud continues to explode in popularity, the problem of cloud sprawl, or cloud waste, also rises. Sprawl is nothing new, so why has it become a top concern for organizations? We’ll go through a brief history of sprawl, explain why it matters today, and discuss the correlation between cloud sprawl and shadow IT. Then we’ll give examples of sprawl you might find in your environment, and tell you how you can eliminate it to make your systems …

According to Rightscale, cost management is the No. 1 challenge for mature cloud users in 2017. That makes sense–after all, what’s the point of adopting hybrid cloud if it ends up being too cost prohibitive? Different from managing your bill, this post talks about how to manage your costs within public cloud, such as Microsoft Azure. So, why is public cloud so expensive? Well, on paper, paying pennies per minute sounds cheap, but costs quickly rise when you factor in every minute …

Get started now. Exceptional service awaits.

Live Chat