BLOG

Top 10 Insights from iVision in 2019

Top 10 Insights from iVision in 2019

Published: Dec 10, 2019   |   Author: Grace Stewart   |   Category: Blog   |   No Comments

The yearly top ten list is a time-honored tradition as old as reminding your employees to use a VPN while they’re home for the holidays. In 2019, iVision published a great deal of blogs, videos, and other content. This list represents some of the year’s most popular pieces. While the list may lack the excitement […]

More
iVision’s Year in Service: 2019

iVision’s Year in Service: 2019

Published: Dec 3, 2019   |   Author: Grace Stewart   |   Category: Blog   |   No Comments

Pledge 1%: Our Second Year In 2018, iVision joined Pledge 1%, a network of companies committed to giving back 1% of their time and profits to help improve local communities. Since then, we’ve created opportunities for iVision employees that leave a lasting impact on nonprofit organizations close to our hearts. This year, iVision partnered with […]

More
4 Ways to Holiday-Proof Your IT Infrastructure

4 Ways to Holiday-Proof Your IT Infrastructure

Published: Nov 18, 2019   |   Author: Grace Stewart   |   Category: Blog   |   No Comments

Whether the last quarter of the year is busy or slow for your business, the year is coming to an end. With the holidays right around the corner, many of your employees are looking to take time off or work remotely to maximize their vacation time. For IT departments, this can mean a lot of […]

More
The Cybersecurity Labor Shortage is Real – What Can You Do?

The Cybersecurity Labor Shortage is Real – What Can You Do?

Published: Nov 11, 2019   |   Author: Thomas Jefferies   |   Category: Blog   |   No Comments

A Cybersecurity Labor Shortage Continues The increased prevalence of data theft and security breaches across almost all industries continues to show that threat actors are becoming more pervasive and advanced. This further cements the need to have a mature, robust, and most of all effective security team in order to mitigate the risks an organization […]

More
Effective IT Project Management: Top Tips

Effective IT Project Management: Top Tips

Published: Nov 1, 2019   |   Author: Jessica Pervis   |   Category: Blog   |   No Comments

As any project manager can attest, each project is unique and has its own challenges. The result is that you cannot have the same cookie cutter approach to each project. Instead, you must tailor your approach with each project and team. This does not mean altering your process or framework; instead, you need to adapt […]

More
Vulnerabilities and Threats in the Cloud and Key Areas Often Overlooked in Safeguarding Infrastructure

Vulnerabilities and Threats in the Cloud and Key Areas Often Overlooked in Safeguarding Infrastructure

Published: Oct 22, 2019   |   Author: Ronald Pipkins   |   Category: Blog   |   No Comments

A quick Google search on ‘how to secure cloud infrastructure’ returns 263 million hits. With all this information available, it’s challenging to stay ahead of vulnerabilities and threats while ensuring security posture in your cloud environments. Cloud infrastructure has become one of the most attractive targets for threat actors because of the vast amount of […]

More
Understanding Azure Functions to Maintain High Availability

Understanding Azure Functions to Maintain High Availability

Published: Oct 14, 2019   |   Author: Harrison Gibbs   |   Category: Blog   |   No Comments

Azure Functions is a serverless compute platform that offers a highly scalable, event-driven experience for developers. Sometimes known as Function-as-a-Service, serverless architecture allows developers to run small pieces of code without having to think about the infrastructure on which it is executed. Azure Functions gets rid of the need to manage or provision servers, and lets developers work in their […]

More
Reputation Risk Management and Cybersecurity

Reputation Risk Management and Cybersecurity

Published: Oct 2, 2019   |   Author: Grace Stewart   |   Category: Blog   |   No Comments

One of the biggest current threats to an organization’s reputation is data breaches. Companies are expected to protect their clients’ personal data – so a security incident can affect public sentiment for an organization. This wave of negativity and reputational loss can lead to customers severing their connection to the company. Not only that, but […]

More
Windows Feature Updates for IT Lifecycle Management

Windows Feature Updates for IT Lifecycle Management

Published: Sep 25, 2019   |   Author: Eric Goodman   |   Category: Blog   |   No Comments

While the days of Service Packs may be gone, Windows does still need to be upgraded on a regular basis. Microsoft has certainly made the job much easier for IT administrators but there are still some important methodologies to discuss and decisions to make. Understanding the concepts around Windows lifecycle management will help you and […]

More
Cisco DNA Center Assurance: What You Need to Know

Cisco DNA Center Assurance: What You Need to Know

Published: Sep 20, 2019   |   Author: Clint St. Romain   |   Category: Blog   |   No Comments

The Internet of Things (IoT) has brought an increase in the number of devices connected to any given network. These growing, complex networks need to be managed more efficiently than ever before – and with an IT budget that hasn’t grown to match. How do you manage your network and still have time to focus […]

More
Security Awareness Training: Secure Your Company Culture

Security Awareness Training: Secure Your Company Culture

Published: Sep 5, 2019   |   Author: Shane Sheppard   |   Category: Blog   |   No Comments

Every day it seems like there is another security incident or attack that has critically impacted the targeted organization. In a large number of these, the attack directly involved the organization’s own employees or users. For example, a recent coordinated ransomware attack hit the computer systems of local government agencies in 22 small Texas towns. […]

More
Why Employee Referrals Are Crucial For Hiring In Tech

Why Employee Referrals Are Crucial For Hiring In Tech

Published: Aug 22, 2019   |   Author: Josh Walling   |   Category: Blog   |   No Comments

Referrals improve quality of candidates and hires There is no greater advocate for a company than its own employees. Studies have shown that referrals are no longer the number one source for finding candidates; however, those same studies report that employee referrals still account for nearly 13% of hiring. Furthermore, referrals typically attract high-quality candidates […]

More