Blog

Oct
22
2019
Vulnerabilities and Threats in the Cloud and Key Areas Often Overlooked in Safeguarding Infrastructure

Vulnerabilities and Threats in the Cloud and Key Areas Often Overlooked in Safeguarding Infrastructure

Author: Ronald Pipkins   |   Category: Blog   |   No Comments   |   Read more

A quick Google search on ‘how to secure cloud infrastructure’ returns 263 million hits. With all this information available, it’s challenging to stay ahead of vulnerabilities and threats while ensuring security posture in your cloud environments. Cloud infrastructure has become one of the most attractive targets for threat actors because of the vast amount of […]

Oct
14
2019
Understanding Azure Functions to Maintain High Availability

Understanding Azure Functions to Maintain High Availability

Author: Harrison Gibbs   |   Category: Blog   |   No Comments   |   Read more

Azure Functions is a serverless compute platform that offers a highly scalable, event-driven experience for developers. Sometimes known as Function-as-a-Service, serverless architecture allows developers to run small pieces of code without having to think about the infrastructure on which it is executed. Azure Functions gets rid of the need to manage or provision servers, and lets developers work in their […]

Oct
2
2019
Reputation Risk Management and Cybersecurity

Reputation Risk Management and Cybersecurity

Author: Grace Stewart   |   Category: Blog   |   No Comments   |   Read more

One of the biggest current threats to an organization’s reputation is data breaches. Companies are expected to protect their clients’ personal data – so a security incident can affect public sentiment for an organization. This wave of negativity and reputational loss can lead to customers severing their connection to the company. Not only that, but […]

Sep
25
2019
Windows Feature Updates for IT Lifecycle Management

Windows Feature Updates for IT Lifecycle Management

Author: Eric Goodman   |   Category: Blog   |   No Comments   |   Read more

While the days of Service Packs may be gone, Windows does still need to be upgraded on a regular basis. Microsoft has certainly made the job much easier for IT administrators but there are still some important methodologies to discuss and decisions to make. Understanding the concepts around Windows lifecycle management will help you and […]

Sep
20
2019
Cisco DNA Center Assurance: What You Need to Know

Cisco DNA Center Assurance: What You Need to Know

Author: Clint St. Romain   |   Category: Blog   |   No Comments   |   Read more

The Internet of Things (IoT) has brought an increase in the number of devices connected to any given network. These growing, complex networks need to be managed more efficiently than ever before – and with an IT budget that hasn’t grown to match. How do you manage your network and still have time to focus […]

Sep
5
2019
Security Awareness Training: Secure Your Company Culture

Security Awareness Training: Secure Your Company Culture

Author: Shane Sheppard   |   Category: Blog   |   No Comments   |   Read more

Every day it seems like there is another security incident or attack that has critically impacted the targeted organization. In a large number of these, the attack directly involved the organization’s own employees or users. For example, a recent coordinated ransomware attack hit the computer systems of local government agencies in 22 small Texas towns. […]

Aug
22
2019
Why Employee Referrals Are Crucial For Hiring In Tech

Why Employee Referrals Are Crucial For Hiring In Tech

Author: Josh Walling   |   Category: Blog   |   No Comments   |   Read more

Referrals improve quality of candidates and hires There is no greater advocate for a company than its own employees. Studies have shown that referrals are no longer the number one source for finding candidates; however, those same studies report that employee referrals still account for nearly 13% of hiring. Furthermore, referrals typically attract high-quality candidates […]