The iVision Blog

2023 Recruiting Outlook: Steady Your Ship!

2023 Recruiting Outlook: Steady Your Ship!

Published: Jan 25, 2023   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

2023 is a year of uncertainty for many companies. The tech industry has begun conducting layoffs in anticipation of recession, and inflation has affected us all. In times of uncertainty, it is more important than ever to find companies that offer stability.   What makes your company stable? You should be examining your company’s business […]

More
Prioritizing Data Protection with iVision Cloud

Prioritizing Data Protection with iVision Cloud

Published: Jan 23, 2023   |   Author: , , and    |   Category: Blog   |   Tags: ,   |   No Comments

Data protection is a critical component of any IT business plan, as data loss or system failure is not a question of “if” but “when.” At iVision, we offer multiple data protection services for Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS). To accomplish this, we employ products like CommVault, Veeam, […]

More
Enhancing the Reportability of User Activity in ServiceNow

Enhancing the Reportability of User Activity in ServiceNow

Published: Jan 19, 2023   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

The ability to create reports, graphs and other types of data visualizations within ServiceNow is vast. Between out-of-the-box reporting and ServiceNow’s Performance Analytics feature that allows for more granular and complex logic, there are almost limitless ways to visualize persistent data, all within the ServiceNow platform. One limitation that ServiceNow reporting does have, though, is […]

More
Giving Back: The iVision Way

Giving Back: The iVision Way

Published: Dec 23, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

At iVision, service is at the heart of our culture. Whether it’s a 1% Pledge volunteer day, a companywide donation drive or personal acts of kindness, we take great pride in our community commitment. This year, we’re grateful for the return to more in-person volunteer events and making an impact together. Throughout the course of […]

More
Reasons to Use Power BI

Reasons to Use Power BI

Published: Dec 15, 2022   |   Author:    |   Category: Blog   |   No Comments

For your business to thrive, you need flexible, adaptable apps and data solutions that scale to meet the growing demands of your business. At Plus+, we use Microsoft Power BI to help clients build a data-driven culture by empowering teams with new business intelligence and data visualization solutions. Power BI offers a lot of ways to transform data […]

More
What is Product Security?

What is Product Security?

Published: Dec 15, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

The complexity of software is at an all-time high, growing more complex with every passing year. Our distributed systems are so large that even small teams of people can’t fully understand them. A single issue can cost hundreds of millions of dollars or take out an entire 911 system. In this ever-evolving, complex world of software development, how […]

More
How to Root an Embedded Linux Box with a Sewing Needle

How to Root an Embedded Linux Box with a Sewing Needle

Published: Dec 15, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

One of the most critical issues that we look for when we assess an embedded/IoT device is secrets that are shared across the device population. Usually, finding these secrets involves gaining full access to our own device in order to find out how other devices may be affected. For example, an LTE router may have […]

More
What Does Certificate Pinning Mean?

What Does Certificate Pinning Mean?

Published: Dec 15, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Securing your mobile applications ensures that you and your customers are safe. And unfortunately, just using SSL and HTTPS doesn’t fully protect your data. Instead, certificate pinning currently tops the list of ways to make your application traffic secure. Today we’ll look at what certificate pinning is and how it secures your application from man-in-the-middle attacks. We’ll […]

More
What is a Federated Login?

What is a Federated Login?

Published: Dec 15, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Very often, there’s an indispensable need for users to access multiple applications, which are hosted by several organizations directly involved in the project. This need is almost always present irrespective of the size or criticality of the project. With multiple security domains comes the greater pain of having to remember the different credentials for each […]

More
Sales Spotlight: Todd Rogers

Sales Spotlight: Todd Rogers

Published: Dec 8, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Favorite iVision Client Engagement Value: I am responsive to the obvious and not so obvious needs of our clients.   Todd’s Career Journey:    My first job in Atlanta was at Cbeyond, selling T1’s to small businesses all around the area. I had to go door to door 40 to 50 times a day, which taught me […]

More
An Introduction to Server-Side Template Injections with Flask

An Introduction to Server-Side Template Injections with Flask

Published: Nov 28, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

The idea of a web application template is basically what it sounds like. Imagine it is around the holidays and you are writing letters to 20+ relatives. Having to write 20+ letters to each relative eventually becomes a little tedious. Your letters may end up becoming something like this: Dear {relative name}, I hope you […]

More
5 Ways to Protect Yourself from Cyber Threats

5 Ways to Protect Yourself from Cyber Threats

Published: Nov 15, 2022   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Technological advancements have become increasingly more robust, making the digital landscape even easier to manipulate. Not taking security and privacy seriously enough could cost you. Here are five ways with explainer videos, featuring Microsoft solutions, to protect your personal and professional data from cyber threats.  Multi-factor Authentication (MFA) MFA is one of the most effective, […]

More