BLOG

How Tech Has Aided Accessibility

How Tech Has Aided Accessibility

Published: Jul 26, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

As new technology develops, so does the opportunity to be more inclusive. Over the years, the tech industry has come a long way in accommodating individuals of all ability levels and using innovation to fill complex gaps. As much as innovating new technologies impacts business operations, it can also make a great difference in aiding […]

More
The Weakest Link(s)

The Weakest Link(s)

Published: Jul 21, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

As identity verification and access governance continues to tackle and prevent criminals from overtaking bank accounts, breaching workforce services or plainly preventing them from doing what they hoped to do, they have resorted to exploiting the IAM chain. And they are finding success! How so? The Human Factor What happens when you reach the point […]

More
Supercharge Intune Reporting

Supercharge Intune Reporting

Published: Jun 22, 2022   |   Author:    |   Category: Blog   |   No Comments

You’ve attended Microsoft conferences, you’ve read all the blogs, you’ve heard all the chatter around the Microsoft Modern Desktop. You have even begun the journey to Modern Desktop management using Microsoft Endpoint Manager and Intune. Maybe you’re transitioning from the rock-solid on-premise Configuration Manager using co-management. Or, if you’re coming from some other solution, perhaps […]

More
Sales Spotlight: Mark Davis

Sales Spotlight: Mark Davis

Published: Jun 13, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Favorite Client Engagement Value: I seek to earn clients for life, every day.   Mark’s Career Journey:   After graduating from Georgia Southern University, I started my professional career as a LAN Administrator for AGCO in Duluth, GA. I thoroughly enjoyed the technical aspect of being a LAN Administrator but wanted the opportunity to learn more […]

More
To Be or Not To Be…Verified

To Be or Not To Be…Verified

Published: Jun 6, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

You likely have not only heard of MFA, or multi-factor authentication, but you use it in either your personal online services or in the workplace. Multi-factor authentication ​​​​​​assumes the premise of multi-dimensional identity verification techniques, such as verifying you based on ​​​​​​​something you know and/or something you have in your possession. But what have we been seeing in practice? 2-in-1 Deal! […]

More
5 Best Practices for Network Design

5 Best Practices for Network Design

Published: May 16, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Remember when network design utilized the on-premises data center as the central hub? Well, those days are long gone. New technologies, increased cloud adoption, applications, remote and roaming workers and a myriad of other factors have made traditional WAN networks practically obsolete, as they can no longer keep up with online business and IT demands. […]

More
Firewall Architecture in the Cloud

Firewall Architecture in the Cloud

Published: May 10, 2022   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

In my last blog, I explained why you need a firewall in the cloud. Now, let’s talk about the how. Typically, customers have two different deployment models of their cloud network infrastructure: the flat VNet/VPC and then the hub and spoke model (most network engineers will recognize this model, shout out to DMVPN). There is […]

More
How Azure AD Falls Short of Identity Governance

How Azure AD Falls Short of Identity Governance

Published: May 3, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Identity Governance – the “Why” and the “What” Is Identity Governance not the same as Identity (and Access) Management? Why not? Technically, what we consider as IAM stems from the need to support network-based access within a corporation, government agency or education facility. This includes tasks like provisioning an identity in Microsoft Active Directory (AD) […]

More
What We’ve Learned About IT Security from Past Network Breaches

What We’ve Learned About IT Security from Past Network Breaches

Published: Apr 18, 2022   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

With the rise of cloud connectivity and the remote workforce, the perimeter of enterprise organizations has greatly expanded. We’ve moved on from an original perimeter of endpoints, on-site users, servers, applications and data centers to a new identity perimeter that includes vendors and contractors, personal and mobile devices, remote employees and cloud infrastructure and applications. […]

More
Device Management in the World of Consulting

Device Management in the World of Consulting

Published: Apr 6, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

In light of the Okta frenzy on March 22, 2022, Okta announced that LAPSUS$ posted screenshots they were able to take from a security engineer’s computer. This security engineer worked for third party company Okta works (or worked) with, Sitel. The low down is that LAPSU$$ was able to access a computer used by this Sitel worker, […]

More
Do I Need a Firewall in the Cloud?

Do I Need a Firewall in the Cloud?

Published: Mar 23, 2022   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

This blog series will cover architecture decisions that should be considered when migrating to the cloud. This series is written by a team of consultants that have worked with all walks of life in the cloud, from Fortune 50 enterprise to the “born in the cloud” startups, from FinTech to the retail industry. If there […]

More
Sales Spotlight: Courtney Simo

Sales Spotlight: Courtney Simo

Published: Mar 15, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Favorite iVision Client Engagement Value: I am empowered to go the extra mile for my coworkers, clients and community.  Courtney’s Career Journey:   After graduating from Troy University, I started my professional career in Sales for an IT staffing and rural sourcing company, Optomi Professional Services. I absolutely loved working with my clients to understand their […]

More