Recent Posts by Steve Brown

Stephen Brown is one of the founding partners of Rutter and has been with the company since its inception. His responsibilities include lead technical consulting to customers in the areas of design, installation and support of Perimeter Security systems, Infrastructure Hardware, Intrusion Detection Systems and VPN's. Steve's primary responsibilities also involve the day to day operations of the company including corporate finances. He has been in the consulting/IT industry since 1990 and maintains multiple technology certifications. He holds a BS in Electrical Engineering from University of Massachusetts - Lowell.
Find me on:

Is AWS Right for My Small or Midsize Business?

According to TechGenix, it is estimated that 78 percent of all small businesses will adopt cloud technologies by the year 2020. This estimation makes sense when you consider the cost savings that small- and medium-sized businesses (SMBs) find after they move to the cloud. As the popularity of cloud computing with SMBs grows, so does the interest in Amazon Web Services (AWS) as a cloud provider. This is expected as AWS remains the dominant force in the market, even when compared to heavyweights like Microsoft and Google.

Read More

5 Key Advantages Networking Security Can Bring to Your Boston Business

When the global average cost of a data breach is $3.86 million dollars, you can be assured that businesses take notice. This number alone should be enough to convince anyone to take networking security seriously. However, cost savings and an untarnished reputation aren’t the only advantages that networking security brings to your business.

Read More

Tips for Setting up Your AWS Security

There was a time when both business leaders and IT leaders avoided the cloud, citing security as one of their top reasons to keep data, applications, and infrastructure out of the cloud and on-premises. Although this line of thinking was relatively recent, it is a myth that has since been dispelled. Cloud providers such as Amazon bring highly talented, security-focused people to their teams to help businesses better secure things on their side. 

Read More

Network Reliability Issues in Boston? These IT Services Can Help

Any project your IT staff implements, whether it involves computer networks, cloud services, or mobile capabilities, is done with the sole purpose of helping drive business goals forward. Well-thought-out projects that undergo proper planning often do just that. One area that has the capability to completely disrupt the technology that many businesses rely on is network reliability. Network reliability issues cause things to run slowly because of latency, or even result in complete downtime during which no business can be completed. When people aren’t able to work, your company loses money.

Read More

Best Practices for Managing Your AWS Security

When it comes to cloud infrastructure services, Amazon Web Services (AWS) still reigns at the top of the list for cloud infrastructure services with more than 30 percent of the market share. By comparison, the second-most popular cloud service, Microsoft Azure, comes in at approximately 15 percent.

Read More

Data Security 101: Questions to Ask IT Service Providers in Boston

The idea of threats to data security often conjures up thoughts of large companies plastered across the national news because thousands of records were compromised at the hands of a malicious hacker. Unfortunately, this often provides smaller organizations with a false sense of security; they start to believe that the bad guys are only after the large companies with a lot of money at stake.

Read More

IT Services in Boston That SMBs Should Be Aware Of

Gone are the days when small businesses relied on the technology department to come in every so often to deal with all of their tech needs. Information technology, even for small to midsize businesses (SMBs), now relies on highly trained individuals who specialize in various areas.

Read More

5 Trends in IT Security Services to Watch for in 2019

IBM’s SecurityIntelligence reported some frightening statistics regarding data breaches in 2018. Although the time it takes to detect a data breach is down from years to 196 days, the cost of a breach has increased. On average, the cost of a compromised record is up to $148. This is tough news for most organizations to deal with, and experts expect the number of records compromised per breach to increase, as well.

These reasons alone make it more important than ever for organizations to stay informed about the latest trends in IT security. Considering the damage that can be done to the reputation of a business that is the victim of cybercrime, you have more reason than ever to understand what the threat landscape looks like for this year.

Read More

Microsoft Exchange 2019 versus Office 365 - Pros and Cons


Organizations turn to Microsoft because their product suite is able to check the boxes that IT staff, operational staff and procurement look for when making a purchase. Their server offerings, operating systems and applications make up the central core of many a business because they are known to be reliable, stable and capable for the task at hand.

Recently, Microsoft issued an end-of-life announcement that includes a number of products that a large percentage of organizations still rely on to handle day-to-day IT and end-user business functions. With a deadline of January 2020, this announcement has caught a number of organizations off guard or simply thrown businesses into a state of denial because they had not planned on upgrading or migrating away from any of the products mentioned in the announcement.

Read More

How AWS Can Work For Hybrid Cloud Customers

There are many reasons why an organization may opt for a hybrid cloud environment. The company may feel safer keeping certain applications, infrastructure, or data on premises; there may be a technical need, such as reliance on legacy software, that requires a hybrid environment; or they might require on-premises data storage because of the various existing regulations.

Read More