Database Security—Repelling a Breach with Defense-in-Depth

Lily Hay Newman, in a recent article in Wired, pegs “poorly secured databases that connect directly to the internet” as a main culprit for many of today’s mega data breaches. Why? Robust database security offers a defense-in-depth strategy should an attacker breach your perimeter defenses. But if the security measures are left unused, the sensitive data presents an easy target for hackers to go after.

Read More

Need Managed IT Services in Boston? Look for These Skills

Businesses have a serious problem when it comes to IT. Seventy percent of IT managers agree that the speed of technology outpaces their workers’ skills, according to Upwork research. Boston-based companies are no stranger to this problem. Organizations across the region often find that their current teams lack the knowledge required to keep pace with newer technologies, or they have trouble hiring new employees to fill these needs. 

Read More

6 IT Security Services to Build Your Cybersecurity Foundation

When it comes to cybersecurity, there’s one constant that business leaders can agree on: The threat landscape is ever evolving. As a result, Gartner forecasts that in businesses worldwide will spend more than $124 billion on information security spending in 2019. However, not all organizations have a large budget to spend on protecting their businesses. In the greater Boston area, the business community is focused on putting the right security services into place to help each of their organizations build a solid security foundation. Below are six services we recommend that you consider to build a strong security position.

Read More

Boston-Based Cybersecurity Companies You Need to Know About

According to the Privacy Rights Clearinghouse, there have been approximately 11.2 billion records exposed in the more than 8,800 data breaches that have been publicly disclosed since 2005. In 2018 alone, there were more than 1 billion exposed records in that staggering total.

Read More

5 Myths about Backup Solutions on AWS

There have been a myriad of myths surrounding cloud computing ever since its inception. Unfortunately, too many decision-makers believe these myths when evaluating a service like Amazon Web Services (AWS) for their backup solution, which can either lead them down a path where they live under a false sense of security or cause them to avoid using AWS due to misconceptions. Below, we will take a look at a few of the myths that surround AWS backup solutions and address them to give you the right information.

Read More

4 Reasons to Enable Office 365 Two Factor Authentication

In Office 365, administrators have the option to enable an additional layer of security: multi-factor authentication (MFA). This feature allows the IT staff to set two or more verification methods when it comes to user sign-ins and other transactions. Two-factor authentication (2FA) is a subset of MFA where the end user is required to provide two methods of verification, as opposed to more. But if you are not sure if you want to go through the trouble of enabling 2FA in your environment, let’s take a look at four reasons that may change your mind.

Read More

Running VMWare on AWS: What You Need to Know

In 2016, VMWare and Amazon announced a partnership that would make VMWare Cloud available on Amazon Web Services (AWS). This partnership brought the capability for organizations to run their software both on their on-premises data centers and on the AWS cloud to create a true hybrid cloud or make it easier to move to the public cloud.

Read More

3 Considerations when Creating a Disaster Recovery Strategy on AWS

In 2017, Vade Secure reported that ransomware-infected emails rose 6,000 percent. Recent natural disasters have brought business operations down across the globe. Then there are outages that are the result of human error: Someone misconfigures something or enters the wrong command and systems go down.

Read More

4 Strategies for Overcoming Shadow IT

Research from Gartner shows that nearly 40 percent of all money spent on technology purchases comes from outside of the IT department. Those purchases are known as shadow IT. Most organizations can relate to the problem of shadow IT. Not only does it open the door to security issues, but it can cause conflicts with business critical applications. In addition to these problems, dealing with the issues of shadow IT pulls the IT staff away from projects meant to meet business goals.

Read More

Wireless Site Surveys: Why Free Tools Aren’t Enough

 

At its most fundamental level, a wireless site survey allows you to sift out reliable empirical data concerning Radio Frequency (RF) characteristics at a given location. A solid understanding of these characteristics and the data collected from the survey will likely reveal where any deficiencies are located, as well as areas of channel interference, dead zones, and other problem areas along the network.

Read More