Blog
Keep Prying Eyes Away from Data in the Cloud
In a previous blog post, we pointed out that your data in the cloud may not be as safe as you thought it was. As many of the stakeholders at the organizations where our IT Consultants serve in the role of virtual CIO read the post, they asked us how they could still take advantage…
Widely Reported Internet Security Flaw – What You Need to Know
Reports of a flaw in one of the basic building blocks of Internet security have hit the press this morning, and in typical fashion there is a lot of FUD (Fear, Uncertainty, and Doubt) and sensationalism happening. We have already been contacted by a number of our customers about their exposure, so we wanted to…
Moving Data to the Cloud? Hope You Trust Your Provider…
Most small and mid-market companies these days have had some type of discussion around the cloud. Many are even using the cloud or are developing their strategy to take advantage of what the cloud has to offer. In the IT consulting strategy sessions we hold with our customers, trying to figure out how to use…
The Internet of Things – Part 2 of 2
In my last post, I opened a discussion on the Internet of Things, and loosely defined the category by breaking the devices down into two categories. This post is about the second of those two categories – those devices that are connected directly to the Internet. My favorite example from my own experience in this…
URGENT ALERT: Microsoft Announces Zero Day Word Exploit
Late last night, Microsoft announced a newly discovered exploit that is in the wild that allows remote code execution by merely previewing an email in Microsoft Outlook (without clicking on it or taking any other action). Although this has not been patched yet, Microsoft has issued a Fix It solution which will disable use of…