BLOG

How to Get Better Bugs from Your Pentest

How to Get Better Bugs from Your Pentest

Published: Oct 25, 2021   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

During scoping for penetration tests, customers often say that they want us to perform the engagement exactly as a bad actor would, with no collaboration from the customer’s IT or security teams and no access to inside information. This is known as a black box penetration test, a methodology we often advise against.  On the […]

More
High-Capacity Drives and Performance Considerations

High-Capacity Drives and Performance Considerations

Published: Oct 13, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

While working with a client the other day, we had an interesting conversation regarding footprint consolidation. As infrastructure has gotten smaller and faster, we are able to get more resources into a smaller footprint. At iVision, we see this use case on a regular basis:  a client is moving their current data center into a […]

More
The Feeling is Mutual: Elegant & Effective Authentication

The Feeling is Mutual: Elegant & Effective Authentication

Published: Sep 22, 2021   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

If your user base is primarily IoT devices and your organization doesn’t want to manage passwords for each device, then it seems like a series of unguessable passwords such as “d3v1ce [serial-number]” is the only solution. While that technically works, it isn’t the most user-friendly option. For a more elegant and effective solution, consider mutual […]

More
What Problem Does a Network Overlay Solve?

What Problem Does a Network Overlay Solve?

Published: Sep 13, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Software-defined networks have been around for several years. Often, people learn how the overlay works but may not know what problems they can solve. I will attempt to answer that question with a scenario. Let’s say we have in our data center 1,000 servers, each of which house 50-100 virtual servers. If we have 25 […]

More
How is IAM Divided Today?

How is IAM Divided Today?

Published: Sep 2, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Over time, identity & access management (IAM) has become, not only a complicated subject, but also the core to information security. When we think of InfoSec, we generally think of cybersecurity to detect or thwart distributed denial of service (DDoS) or brute force attacks. However, once a bad actor breaches the perimeter defense, what do they intend to […]

More
Preserving Company Culture from Home

Preserving Company Culture from Home

Published: Aug 24, 2021   |   Author:    |   Category: Blog   |   Tags:   |   One Comment

What a whirlwind of a year. The past 18 months have had so many ups and downs for so many! When the world shut down last March, HR had to put it into overdrive to make sure that our employees were safe. There were still so many unknowns. After checking in with employees to make […]

More
Problem Management’s Role in an MSP

Problem Management’s Role in an MSP

Published: Aug 10, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Problem Management Defined Problem management helps prevent the occurrence of incidents and their impact, while also working to prevent incidents that have already occurred from happening again in the future. This starts with identifying a problem and finding ways to mitigate or fix the underlying cause. A “problem” according to the ITIL definition is “the […]

More
What Can You Do to Avoid a Cyberattack?

What Can You Do to Avoid a Cyberattack?

Published: Aug 4, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

On July 2nd 2021, the threat group REvil launched a targeted attack against the users of the Kaseya VSA product, a remote monitoring and management (RMM) tool many organizations and MSPs leverage to support their infrastructure. The unprecedented-scale attack exploited a vulnerability in the product, allowing the threat actors to infiltrate more than 30 MSPs, […]

More
Automate Your Help Desk

Automate Your Help Desk

Published: Jul 21, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Create an exceptional customer service experience and build stronger customer relationships by expanding services through automation. IT organizations often struggle to get customers engaged to self-help capabilities. However, once implemented, customers find that it meets their needs more quickly and provides a better overall experience. Expanding an organization’s tools to a Service Catalog and offering […]

More
The Evolution of Gender in Technology

The Evolution of Gender in Technology

Published: Jul 14, 2021   |   Author:    |   Category: Blog   |   Tags:   |   One Comment

In the early days of tech, there were no real conversations about the implications of creating code that relied on gender, but with 1.2 million U.S. adults identifying as nonbinary, it’s clearly a conversation worth having. Over the years, we’ve developed a much more comprehensive perception of gender and how we can refrain from viewing it as a […]

More
Hybrid Cloud Strategy…Just a Component of Modernization

Hybrid Cloud Strategy…Just a Component of Modernization

Published: Jul 8, 2021   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

We’ve all read or listened to different explanations and definitions of what a hybrid cloud is. Many contain a manufacturer’s bent, and others are just kind of – well – creative. Everybody’s Talking About It Consider Ann Burrell, the shark-finned white-haired culinary star – now an IBM spokeswoman for hybrid cloud…huh? Yup, she’s got a […]

More