Recent Posts by Steve Brown

Stephen Brown is one of the founding partners of Rutter and has been with the company since its inception. His responsibilities include lead technical consulting to customers in the areas of design, installation and support of Perimeter Security systems, Infrastructure Hardware, Intrusion Detection Systems and VPN's. Steve's primary responsibilities also involve the day to day operations of the company including corporate finances. He has been in the consulting/IT industry since 1990 and maintains multiple technology certifications. He holds a BS in Electrical Engineering from University of Massachusetts - Lowell.
Find me on:

Microsoft Exchange 2019 versus Office 365 - Pros and Cons


Organizations turn to Microsoft because their product suite is able to check the boxes that IT staff, operational staff and procurement look for when making a purchase. Their server offerings, operating systems and applications make up the central core of many a business because they are known to be reliable, stable and capable for the task at hand.

Recently, Microsoft issued an end-of-life announcement that includes a number of products that a large percentage of organizations still rely on to handle day-to-day IT and end-user business functions. With a deadline of January 2020, this announcement has caught a number of organizations off guard or simply thrown businesses into a state of denial because they had not planned on upgrading or migrating away from any of the products mentioned in the announcement.

Read More

How AWS Can Work For Hybrid Cloud Customers

There are many reasons why an organization may opt for a hybrid cloud environment. The company may feel safer keeping certain applications, infrastructure, or data on premises; there may be a technical need, such as reliance on legacy software, that requires a hybrid environment; or they might require on-premises data storage because of the various existing regulations.

Read More

4 Reasons Why Outsourcing Your IT Support Makes Sense

Many businesses in the greater Boston area have found that outsourcing their IT support makes sense. When outsourcing, an organization looks to build a trusted partnership with a managed services provider who will then work with the company to take on IT-related tasks that the company doesn’t have the resources or budget to do in house.

Of course, it’s not just Boston businesses that are turning to this model. Thousands of organizations outside of Massachusetts rely on this service as well. Take a look at four reasons why outsourcing your IT support makes sense:

Read More

Need Managed IT Services in Boston? Look for These Skills

Businesses have a serious problem when it comes to IT. Seventy percent of IT managers agree that the speed of technology outpaces their workers’ skills, according to Upwork research. Boston-based companies are no stranger to this problem. Organizations across the region often find that their current teams lack the knowledge required to keep pace with newer technologies, or they have trouble hiring new employees to fill these needs. 

Read More

6 IT Security Services to Build Your Cybersecurity Foundation

When it comes to cybersecurity, there’s one constant that business leaders can agree on: The threat landscape is ever evolving. As a result, Gartner forecasts that in businesses worldwide will spend more than $124 billion on information security spending in 2019. However, not all organizations have a large budget to spend on protecting their businesses. In the greater Boston area, the business community is focused on putting the right security services into place to help each of their organizations build a solid security foundation. Below are six services we recommend that you consider to build a strong security position.

Read More

Boston-Based Cybersecurity Companies You Need to Know About

According to the Privacy Rights Clearinghouse, there have been approximately 11.2 billion records exposed in the more than 8,800 data breaches that have been publicly disclosed since 2005. In 2018 alone, there were more than 1 billion exposed records in that staggering total.

Read More

5 Myths about Backup Solutions on AWS

There have been a myriad of myths surrounding cloud computing ever since its inception. Unfortunately, too many decision-makers believe these myths when evaluating a service like Amazon Web Services (AWS) for their backup solution, which can either lead them down a path where they live under a false sense of security or cause them to avoid using AWS due to misconceptions. Below, we will take a look at a few of the myths that surround AWS backup solutions and address them to give you the right information.

Read More

4 Reasons to Enable Office 365 Two Factor Authentication

In Office 365, administrators have the option to enable an additional layer of security: multi-factor authentication (MFA). This feature allows the IT staff to set two or more verification methods when it comes to user sign-ins and other transactions. Two-factor authentication (2FA) is a subset of MFA where the end user is required to provide two methods of verification, as opposed to more. But if you are not sure if you want to go through the trouble of enabling 2FA in your environment, let’s take a look at four reasons that may change your mind.

Read More

Running VMWare on AWS: What You Need to Know

In 2016, VMWare and Amazon announced a partnership that would make VMWare Cloud available on Amazon Web Services (AWS). This partnership brought the capability for organizations to run their software both on their on-premises data centers and on the AWS cloud to create a true hybrid cloud or make it easier to move to the public cloud.

Read More

3 Considerations when Creating a Disaster Recovery Strategy on AWS

In 2017, Vade Secure reported that ransomware-infected emails rose 6,000 percent. Recent natural disasters have brought business operations down across the globe. Then there are outages that are the result of human error: Someone misconfigures something or enters the wrong command and systems go down.

Read More