<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2923012&amp;fmt=gif">

Recent Posts by Steve Brown

Stephen Brown is one of the founding partners of Rutter and has been with the company since its inception. His responsibilities include lead technical consulting to customers in the areas of design, installation and support of Perimeter Security systems, Infrastructure Hardware, Intrusion Detection Systems and VPN's. Steve's primary responsibilities also involve the day to day operations of the company including corporate finances. He has been in the consulting/IT industry since 1990 and maintains multiple technology certifications. He holds a BS in Electrical Engineering from University of Massachusetts - Lowell.
Find me on:

Need Managed IT Services in Boston? Look for These Skills

Businesses have a serious problem when it comes to IT. Many IT managers would agree that the speed of technology outpaces their workers’ skills. Boston-based companies are no stranger to this problem. Organizations across the region often find that their current teams lack the knowledge required to keep pace with newer technologies, or they have trouble hiring new employees to fill these needs. 

Read More

6 IT Security Services to Build Your Cybersecurity Foundation

When it comes to cybersecurity, there’s one constant that business leaders can agree on: The threat landscape is ever evolving. As a result, Gartner forecasts that in businesses worldwide will spend more than $124 billion on information security spending in 2019. However, not all organizations have a large budget to spend on protecting their businesses. In the greater Boston area, the business community is focused on putting the right security services into place to help each of their organizations build a solid security foundation. Below are six services we recommend that you consider to build a strong security position.

Read More

Boston-Based Cybersecurity Companies You Need to Know About

According to the Privacy Rights Clearinghouse, there have been approximately 11.2 billion records exposed in the more than 8,800 data breaches that have been publicly disclosed since 2005. In 2018 alone, there were more than 1 billion exposed records in that staggering total.

Read More

5 Myths about Backup Solutions on AWS

There have been a myriad of myths surrounding cloud computing ever since its inception. Unfortunately, too many decision-makers believe these myths when evaluating a service like Amazon Web Services (AWS) for their backup solution, which can either lead them down a path where they live under a false sense of security or cause them to avoid using AWS due to misconceptions. Below, we will take a look at a few of the myths that surround AWS backup solutions and address them to give you the right information.

Read More

4 Reasons to Enable Office 365 Two Factor Authentication

In Office 365, administrators have the option to enable an additional layer of security: multi-factor authentication (MFA). This feature allows the IT staff to set two or more verification methods when it comes to user sign-ins and other transactions. Two-factor authentication (2FA) is a subset of MFA where the end user is required to provide two methods of verification, as opposed to more. But if you are not sure if you want to go through the trouble of enabling 2FA in your environment, let’s take a look at four reasons that may change your mind.

Read More

Running VMWare on AWS: What You Need to Know

In 2016, VMWare and Amazon announced a partnership that would make VMWare Cloud available on Amazon Web Services (AWS). This partnership brought the capability for organizations to run their software both on their on-premises data centers and on the AWS cloud to create a true hybrid cloud or make it easier to move to the public cloud.

Read More

3 Considerations when Creating a Disaster Recovery Strategy on AWS

In 2017, Vade Secure reported that ransomware-infected emails rose 6,000 percent. Recent natural disasters have brought business operations down across the globe. Then there are outages that are the result of human error: Someone misconfigures something or enters the wrong command and systems go down.

Read More

4 Strategies for Overcoming Shadow IT

Research from Gartner shows that nearly 40 percent of all money spent on technology purchases comes from outside of the IT department. Those purchases are known as shadow IT. Most organizations can relate to the problem of shadow IT. Not only does it open the door to security issues, but it can cause conflicts with business critical applications. In addition to these problems, dealing with the issues of shadow IT pulls the IT staff away from projects meant to meet business goals.

Read More

Wireless Site Surveys: Why Free Tools Aren’t Enough

 

At its most fundamental level, a wireless site survey allows you to sift out reliable empirical data concerning Radio Frequency (RF) characteristics at a given location. A solid understanding of these characteristics and the data collected from the survey will likely reveal where any deficiencies are located, as well as areas of channel interference, dead zones, and other problem areas along the network.

Read More

5 AWS security best practices for small businesses

Amazon Web Services (AWS) offers small businesses a number of benefits. There are plenty of Amazon Machine Instances that are preconfigured so a small IT team can quickly spin up a virtual appliance, server, or other computing resource. Like any other cloud service, AWS offers scalability to allow business IT resources to grow on demand and it helps control costs by offering a number of different pricing plans. There are, of course, other benefits that entice small businesses to turn to AWS for a number of their computing needs. However, like any other resource, there are security considerations that you need to make.

The following list outlines five of the most important best practices any small business needs to consider when using AWS in their environment.

Read More