Azure Files Sync Considerations - Part 1

Azure file sync is the offering of syncing file information from a file server to a storage account in the cloud. The file server becomes transformed into a local cache of information, and with policies in place, tiering will move older information to the cloud. By doing so, a file server can be extended dramatically.

Read More

Options for Securing VNET Traffic to PaaS Resources in Azure

Historically, one of the challenges of Azure was trying to contain private traffic to resources such as platform-as-a-service (PaaS), Azure files, and Azure SQL. Customers envisioned having a cloud data center with services, and they strived for a vehicle to encapsulate the traffic as they would with a traditional data center.

Read More

Top 10 Security Compliance Policies Your Company Should Have

Information security is a key component of keeping your organization’s data secure. Without proper information security, your company could be vulnerable to cyberattacks, data breaches, or leaks of company-sensitive information. Security policies include processes for accessing and handling information, whether on-site or remotely. 

Read More

Microsoft Exchange 2010 The End Is Near

Microsoft Exchange is a high priority for organizations that rely on email communication internally and externally. IT teams have been anticipating the end date for Exchange 2010 support; similar to other Exchange versions, the support period typically occurs 10 years after the product release. Originally, Microsoft was planning for the extended support end date for Exchange 2010 to be Jan. 14, 2020—the same as Windows 7 and Server 2008. However, the extended support for Exchange 2010 has been pushed back to Oct. 13, 2020.

Read More

Three Boston IT Services Your Business Didn’t Know It Needed

More and more businesses are turning to managed service providers (MSPs) to handle the complex IT solutions required to stay competitive in today’s marketplace. However, some still view the MSP as the guy who fixes the computers when they go down. The role of the MSP has evolved since the days of the single consultant who would come in and reconnect the printer or remove a virus from your computer. 

Read More

Basic Authentication Considerations for Office 365

In order to address security concerns, such as password spray attacks, Microsoft has announced it will end Basic Authentication support on Oct. 13, 2020 for certain protocols. From a risk assessment perspective, the services slated to be blocked as of March 2020 are ActiveSync, POP, IMAP, EWS, and Remote PowerShell.

Read More

5 Considerations for Selecting an Enterprise Wireless Network

Businesses are increasingly feeling the need to re-architect their enterprise networks in order to accommodate the rapidly growing demand for wireless connectivity. Many of them are now compelled to build their own enterprise wireless network to support the influx of mobile devices, Internet of Things, and cloud-based applications, as well as increased adoption of WiFi-hungry practices like BYOD.

Read More

Designing a Hybrid Cloud Strategy for Your IT Budget

Talking about the cloud as a solution no longer draws skepticism in the business world. With over 77 percent of businesses having at least one application or a portion of their infrastructure in the cloud, it is safe to say businesses are now comfortable with cloud technologies. Yet with the increased comfort level comes deeper discussion about what businesses can move to the cloud. 

Read More

3 Compelling Reasons to Outsource IT Support

IT budgets continue to increase each year as business needs evolve, requiring more digital needs and larger infrastructure—according to Spiceworks, 88 percent of organizations expect their IT budgets to stay the same or grow in 2020. Businesses are looking to replace older operating systems by providing hardware such as laptops and to improve security setups to protect sensitive business and personal data.  

Read More

What is a network security assessment?

Over the years, businesses’ mission-critical technology has expanded at a rapid pace. A network no longer consists of only servers, client computers, and basic networking equipment. Cloud computing has been introduced to host “X as a Service” solutions and applications that rely on big data, allow mobile and remote endpoints, network shares, and multiple communication applications, just to name a few. Even the solutions meant to secure the network and endpoints have grown complex to the point where a misconfigured security solution could leave an organization vulnerable.

This is why many organizations turn to outside partners to conduct a network security assessment. Having one performed by a trusted partner lets you know not only where your organization's security posture currently stands, but also what you can do to better protect yourself from the current threat landscape.

Read More