Category: Security

iVision Tech Summit Recap: 5 things to Focus on in 2019

Published: December 19, 2018   |   Category: Blog, Disaster Recovery, Hybrid Cloud Services, IT Strategy, Security  |  Read more

Each year, iVision holds our internal Tech Summit. For one full day, iVision team members join together to exchange ideas, celebrate accomplishments, and brainstorm innovative solutions for our clients. This year’s summit theme was FOCUS. Topics centered on improving your security posture, the importance of mono-tasking, and new developments in the IT world, all things […]

Meet PortSmash, everyone’s favorite new side-channel execution attack.

Published: November 13, 2018   |   Category: Blog, Security  |  Read more

In February 2017, a security researcher and white-hat hacker published information about a set of side-channel/speculative execution attacks that impacted approximately 20 years of Intel and AMD CPUs (among others), allowing for protected memory restrictions to be bypassed by a targeted malicious attack. These vulnerabilities were labeled SPECTRE and MELTDOWN and received a large amount […]

3 things EVERYONE can do to enhance security without ruining productivity

Published: September 28, 2018   |   Category: Blog, Security  |  Read more

Building a secure environment is a constant balance between usability and protection – additional security controls often add steps to the day-to-day of the very people that the controls are intended to support and protect. That’s why it’s important to recognize and elevate the security controls which provide major benefits at a minimal impact to […]

Business resilience is becoming the new operations paradigm.

Published: August 3, 2018   |   Category: Blog, Disaster Recovery, IT Infrastructure, IT Infrastructure Management, IT Strategy, Security  |  Read more

Introduction: In 2017, the world had the highest number of cyber-attacks, natural disasters and more active shooters than any year on record. For example, in June of 2017, the global law firm DLA Piper went a full day without phones, six days without email, and nearly two weeks without complete access to older email and […]