.......................................

Latest News

My Key Security Takeaways from 2019’s Largest Hacker Conference

Posted on August 27, 2019
cybersecurity-screen-technology-business

Recently, I attended DEF CON, the largest hacking conference in the world, and saw how cybercriminals can access anything under the sun. In session after session, I watched as everything from medical devices and cars to computers and the Internet of Things (IoT) were successfully infiltrated.

The entire time, our clients were top of mind, and I was thinking about what the best strategies were to protect them from everything I was witnessing. To help keep Arizona businesses secure, I wanted to share my top 3 IT security tips from the conference.

[Read More]
Microsoft-end-of-life

How to Ensure a Stress-Free Microsoft End-of-Life Migration

Posted on August 5, 2019

Continuing to use Microsoft Windows 7 or Windows Server 2008 after January 14, 2020, is akin to creating a huge billboard for hackers that says, “Here I am, open, come and get me!” On that date, both operating systems enter end-of-life (EOL). When Microsoft classifies a product EOL, it means the company will no longer … Continue reading How to Ensure a Stress-Free Microsoft End-of-Life Migration »

Man unhappy with poor IT support

You Don’t Deserve Bad IT Support

Posted on June 28, 2019

Change is disruptive. It introduces unknown elements into our lives and rather than face uncertainty, we often choose to accept a less-than-ideal situation. You might put up with a mediocre dinner because you know it won’t be awful. You can’t apply the same logic to IT support. Not All Managed Services Providers are the Same … Continue reading You Don’t Deserve Bad IT Support »

Risk Informed Decision-Making Guide

Why Risk-Informed Decision-Making Matters and How to Get Started

Posted on May 31, 2019

60 gallons of water cascading down on your server cabinet is hardly an ideal situation. But if you have a waterline running above your server room, and a valve gives out, it can happen. We know. It happened to a business we work with now. To identify risks, like inconveniently located waterlines and servers, you … Continue reading Why Risk-Informed Decision-Making Matters and How to Get Started »

Hackers Have Windows 7 & Windows Server 2008 End-of-Life Plans. What are Yours?

Posted on April 17, 2019

Zero-day exploit: The details of a software bug are released to the public before the manufacturer has a chance to fix it. Hackers exploit the flaw, harming your business with malware or accessing confidential data. When Microsoft Windows Server 2008 and Windows 7 enter End of Life (EOL) on January 14, 2020, every day has … Continue reading Hackers Have Windows 7 & Windows Server 2008 End-of-Life Plans. What are Yours? »

New Compliance Suite: Created for and by CCOs of Registered Investment Adviser Firms

New Compliance Suite: Created for and by CCOs of Registered Investment Adviser Firms

Posted on February 8, 2019

Background Shelli first worked with the itSynergy team in 2012 and maintained a professional relationship with them as her compliance career progressed. In 2017, as Chief Compliance Officer (CCO) for a local registered investment adviser (RIA) firm, she brought in itSynergy for managed IT services, explaining that she sought them out for their demonstrated industry … Continue reading New Compliance Suite: Created for and by CCOs of Registered Investment Adviser Firms »

OCIE Audits: How IT Experts can Help CCOs Stay Compliant

Posted on January 25, 2019

When it comes to the Office of Compliance Inspections and Examinations (OCIE) audits, there are two recent trends CCOs at Registered Investment Advisor (RIA) firms need to pay attention to: The OCIE is increasingly concerned about cybersecurity. Audits are happening more frequently. Since 2013, the percent of firms audited has risen. As audits become more common, … Continue reading OCIE Audits: How IT Experts can Help CCOs Stay Compliant »

Risk-Informed Decision-Making: What’s Your RIDM IT Loss Tolerance?

Posted on January 7, 2019

How long can your business go without its information technology being operational? Answering this question is an easy way to judge your business’ risk tolerance for loss of IT. So, once you’ve estimated your business’ tolerance for a loss of IT, you can begin to plan and implement risk-informed decision-making (RIDM) processes based on an … Continue reading Risk-Informed Decision-Making: What’s Your RIDM IT Loss Tolerance? »

#1 Lesson from Our Top 8 Blog Posts of 2018

Posted on November 30, 2018

#1 Lesson from Our Top 8 Blog Posts of 2018 As we approach 2019, we’ve been reflecting on the past year. You’re probably doing the same right now with your business – identifying those experiences and lessons from 2018 you can use in the new year to advance toward your goals. Part of our review … Continue reading #1 Lesson from Our Top 8 Blog Posts of 2018 »

Kick ‘Not Secure’ to the Curb: 4 Steps to SSL

Posted on August 6, 2018

Kick ‘Not Secure’ to the Curb: 4 Steps to SSL Michael Cocanower – a certified ethical hacker who uses his powers for good and not evil – gives his insight on Google’s latest update and how he changed his website to SSL (Secure Sockets Layer). Michael Cocanower is also President and CEO of itSynergy. Google’s … Continue reading Kick ‘Not Secure’ to the Curb: 4 Steps to SSL »