BLOG

Vulnerability Management: New Year, Same Story

Vulnerability Management: New Year, Same Story

Published: Jan 28, 2020   |   Author: Thomas Jefferies   |   Category: Blog   |   No Comments

It may be a new year, but 2020 didn’t wait long to remind us that it’s still business as usual in the world of critical security vulnerabilities. January already saw critical vulnerabilities in a wide range of products. This impacted hundreds of thousands of organizations. The vulnerabilities ranged from remote code execution to authentication bypass, cryptographic spoofing to arbitrary code […]

More
Attracting Top IT Talent: How Workplace Culture Matters

Attracting Top IT Talent: How Workplace Culture Matters

Published: Jan 24, 2020   |   Author: Josh Walling   |   Category: Blog   |   No Comments

There’s no one-size-fits-all solution when it comes to attracting and retaining top talent in tech. Many organizations face problems that are more complex than we give them credit for. If you’re an organizational leader, you’re not alone in figuring out the right “mix” to add to your talent acquisition strategy. If you’re a potential job […]

More
How to Prepare for a Successful Cloud Migration

How to Prepare for a Successful Cloud Migration

Published: Jan 8, 2020   |   Author: Aaron Woods   |   Category: Blog   |   No Comments

Enterprises around the globe are looking to migrate their infrastructure to the cloud. Whether you are moving an individual workload or your entire environment, cloud migration requires careful planning. According to LogicMonitor’s Cloud Vision 2020: The Future of the Cloud study, 83% of enterprise workloads will be in the cloud by this year. However, when […]

More
4 Ways a Managed Service Provider Helps You Cut Costs

4 Ways a Managed Service Provider Helps You Cut Costs

Published: Dec 17, 2019   |   Author: Grace Stewart   |   Category: Blog   |   No Comments

As the field of information technology has grown more complicated, companies have turned to managed service providers (MSP) for help. There are many benefits that come from leveraging a trusted, third-party MSP. You can improve your day-to-day business operations and free up your internal IT teams to focus on strategic projects. Importantly, outsourcing to an […]

More
Top 10 IT Insights from the iVision Blog in 2019

Top 10 IT Insights from the iVision Blog in 2019

Published: Dec 10, 2019   |   Author: Grace Stewart   |   Category: Blog   |   No Comments

The yearly top ten list is a time-honored tradition as old as reminding your employees to use a VPN while they’re home for the holidays. In 2019, iVision published a great deal of blogs, videos, and other content. This list represents some of the year’s most popular pieces. While the list may lack the excitement […]

More
Employee Volunteering, Corporate Giving & Pledge 1%

Employee Volunteering, Corporate Giving & Pledge 1%

Published: Dec 3, 2019   |   Author: Grace Stewart   |   Category: Blog   |   One Comment

Pledge 1%: Our Second Year In 2018, iVision joined Pledge 1%, a network of companies committed to giving back 1% of their time and profits to help improve local communities. Since then, we’ve created opportunities for iVision employees that leave a lasting impact on nonprofit organizations close to our hearts. This year, iVision partnered with […]

More
4 Ways to Holiday-Proof Your IT Infrastructure

4 Ways to Holiday-Proof Your IT Infrastructure

Published: Nov 18, 2019   |   Author: Grace Stewart   |   Category: Blog   |   No Comments

Whether the last quarter of the year is busy or slow for your business, the year is coming to an end. With the holidays right around the corner, many of your employees are looking to take time off or work remotely to maximize their vacation time. For IT departments, this can mean a lot of […]

More
The Cybersecurity Labor Shortage is Real – What Can You Do?

The Cybersecurity Labor Shortage is Real – What Can You Do?

Published: Nov 11, 2019   |   Author: Thomas Jefferies   |   Category: Blog   |   No Comments

A Cybersecurity Labor Shortage Continues The increased prevalence of data theft and security breaches across almost all industries continues to show that threat actors are becoming more pervasive and advanced. This further cements the need to have a mature, robust, and most of all effective security team in order to mitigate the risks an organization […]

More
Effective IT Project Management: Top Tips

Effective IT Project Management: Top Tips

Published: Nov 1, 2019   |   Author: Jessica Pervis   |   Category: Blog   |   No Comments

As any project manager can attest, each project is unique and has its own challenges. The result is that you cannot have the same cookie cutter approach to each project. Instead, you must tailor your approach with each project and team. This does not mean altering your process or framework; instead, you need to adapt […]

More
Vulnerabilities and Threats in the Cloud and Key Areas Often Overlooked in Safeguarding Infrastructure

Vulnerabilities and Threats in the Cloud and Key Areas Often Overlooked in Safeguarding Infrastructure

Published: Oct 22, 2019   |   Author: Ronald Pipkins   |   Category: Blog   |   No Comments

A quick Google search on ‘how to secure cloud infrastructure’ returns 263 million hits. With all this information available, it’s challenging to stay ahead of vulnerabilities and threats while ensuring security posture in your cloud environments. Cloud infrastructure has become one of the most attractive targets for threat actors because of the vast amount of […]

More
Understanding Azure Functions to Maintain High Availability

Understanding Azure Functions to Maintain High Availability

Published: Oct 14, 2019   |   Author: Harrison Gibbs   |   Category: Blog   |   No Comments

Azure Functions is a serverless compute platform that offers a highly scalable, event-driven experience for developers. Sometimes known as Function-as-a-Service, serverless architecture allows developers to run small pieces of code without having to think about the infrastructure on which it is executed. Azure Functions gets rid of the need to manage or provision servers, and lets developers work in their […]

More
Reputation Risk Management and Cybersecurity

Reputation Risk Management and Cybersecurity

Published: Oct 2, 2019   |   Author: Grace Stewart   |   Category: Blog   |   No Comments

One of the biggest current threats to an organization’s reputation is data breaches. Companies are expected to protect their clients’ personal data – so a security incident can affect public sentiment for an organization. This wave of negativity and reputational loss can lead to customers severing their connection to the company. Not only that, but […]

More