Whether you use a PC or a Mac, if you are like me, you must rely on Windows Explorer or the Mac Finder to visualize and search your files and data as they are stored on your computer. These tools provide a user-friendly and intuitive way to manage all types of files and documents. They allow you to create new ones, move existing ones around, delete some, rename some, search their content, view metadata describing them, or even open and …

The European General Data Protection Regulation (GDPR) will be enforced starting May 25th, 2018. That’s only 10 weeks away! Are you still scrambling to become compliant? You’re not alone. According to a survey by Solix Technologies, 22 percent of companies were still unaware they had to comply with GDPR as recently as December. The general consensus is that half of all US companies that should be compliant with GDPR by May 25 will not be. Do you need to meet …

Managing customer and employee information properly can be a daunting task for any organization, and determining whether that information should be kept on-premise or in the cloud even more so. Active Directory (AD) is one identity management tool that can help businesses in this respect. AD has had some big changes since its early inception, which we’ll talk about in this post. In the olden days of Microsoft Windows Server AD, you had a simple on-premise repository that stored a …

Two factor authentication is widely recommended as a security practice to give an extra layer of protection to your network and personal accounts, but according to security researchers, if you use SMS texts as your second form of authentication, they could be subject to interception and exploitation. Security researchers demonstrated how easily they were able to manipulate the two-factor set up on a Bitcoin wallet account, simply by intercepting the text message sent over the cellular network. Once they reset …

Cybersecurity journalist Brian Krebs noted on his website the security and simplicity of adding a vocal password to your authentication process when you call a company such as a bank or investment firm to obtain access about your account. Voice passwords are a great idea. They can be a very effective security measure if a hacker calls your bank to open a fraudulent account in your name or requests a large transfer out of your account. Most banks require only your …

Setting budgets has become a key weapon in the ongoing struggle of organizations to understand and control their cloud spend. Public cloud providers have responded by offering their users services such as budget alerts and server tagging. Users, however, still struggle to see the costs associated with the resources they’ve tagged. In this post, we’ll talk about the challenge of viewing your costs in Azure and how you can solve it. Azure offers a few different methods of grouping services: …

As the public cloud continues to explode in popularity, the problem of cloud sprawl, or cloud waste, also rises. Sprawl is nothing new, so why has it become a top concern for organizations? We’ll go through a brief history of sprawl, explain why it matters today, and discuss the correlation between cloud sprawl and shadow IT. Then we’ll give examples of sprawl you might find in your environment, and tell you how you can eliminate it to make your systems …

According to Rightscale, cost management is the No. 1 challenge for mature cloud users in 2017. That makes sense–after all, what’s the point of adopting hybrid cloud if it ends up being too cost prohibitive? Different from managing your bill, this post talks about how to manage your costs within public cloud, such as Microsoft Azure. So, why is public cloud so expensive? Well, on paper, paying pennies per minute sounds cheap, but costs quickly rise when you factor in every minute …

Sprawl has been the lingering problem in IT since the dawn of the client-server model. In the pre-cloud era, sprawl’s impact was only barely felt, as the ongoing cost of support for a workload was rarely as visible or scrutinized as the upfront cost of acquiring infrastructure to run that workload. In the age of private cloud, sprawl was an annoyance, but hardly a driver of noticeable operational cost. Until performance was impacted, sprawl was ignored. When a performance or capacity …

For organizations that use public cloud services, the biggest goal is to optimize the usage and spend of those services. It all comes back to cost management and control–it’s all too easy to lose control of your cloud spend, especially when you don’t know who is spinning up more servers or whether they’re being used in the most cost-effective way. CIOs are experimenting with server tagging as a way to overcome this challenge. What is server tagging? Essentially, it’s creating …

Get started now. Exceptional service awaits.

Live Chat