Blog
My Key Security Takeaways from 2019’s Largest Hacker Conference
Recently, I attended DEF CON, the largest hacking conference in the world, and saw how cybercriminals can access anything under the sun. In session after session, I watched as everything from medical devices and cars to computers and the Internet of Things (IoT) were successfully infiltrated. The entire time, our clients were top of mind,…
How to Ensure a Stress-Free Microsoft End-of-Life Migration
Continuing to use Microsoft Windows 7 or Windows Server 2008 after January 14, 2020, is akin to creating a huge billboard for hackers that says, “Here I am, open, come and get me!” On that date, both operating systems enter end-of-life (EOL). When Microsoft classifies a product EOL, it means the company will no longer…
You Don’t Deserve Bad IT Support
Change is disruptive. It introduces unknown elements into our lives and rather than face uncertainty, we often choose to accept a less-than-ideal situation. You might put up with a mediocre dinner because you know it won’t be awful. You can’t apply the same logic to IT support. Not All Managed Services Providers are the Same…
Why Risk-Informed Decision-Making Matters and How to Get Started
60 gallons of water cascading down on your server cabinet is hardly an ideal situation. But if you have a waterline running above your server room, and a valve gives out, it can happen. We know. It happened to a business we work with now. To identify risks, like inconveniently located waterlines and servers, you…
Hackers Have Windows 7 & Windows Server 2008 End-of-Life Plans. What are Yours?
Zero-day exploit: The details of a software bug are released to the public before the manufacturer has a chance to fix it. Hackers exploit the flaw, harming your business with malware or accessing confidential data. When Microsoft Windows Server 2008 and Windows 7 enter End of Life (EOL) on January 14, 2020, every day has…