<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2923012&amp;fmt=gif">

Blog Categories

Recent Posts by Steve Brown

Stephen Brown is one of the founding partners of Rutter and has been with the company since its inception. His responsibilities include lead technical consulting to customers in the areas of design, installation and support of Perimeter Security systems, Infrastructure Hardware, Intrusion Detection Systems and VPN's. Steve's primary responsibilities also involve the day to day operations of the company including corporate finances. He has been in the consulting/IT industry since 1990 and maintains multiple technology certifications. He holds a BS in Electrical Engineering from University of Massachusetts - Lowell.
Find me on:

[SlideShare] Choosing the Correct Cloud Provider

By far, the largest benefit of cloud computing is its scalability: You use resources as you need them. In high-usage situations, your cloud environment will stretch to meet these demands. In low-usage situations, fewer resources are consumed.

Read More

3 Ways A WiFi Site Survey Benefits Your Business

Today, wireless rules the business world, from the corporation to the retail environment. That becomes clear with the 2017 Cisco Visual Networking Index that states that traffic from wireless and mobile devices will account for more than 63 percent of total IP traffic by 2021.That's both good and bad news for the businesses in the process of building, expanding, or upgrading their WiFi networks due to a host of factors. In order to avoid the negatives such as coverage, security, and excessive cost risks that can negatively impact the business, it’s imperative to start the process with a WiFi site survey.

Read More

Why Massachusetts Businesses Need Agile IT Infrastructure

A recent Dell EMC study showed that participants saw 58 percent of their IT infrastructure transformation as having reached a higher level of maturation, which points to a glaring problem in terms of the remaining 42 percent. Consequently, businesses are increasingly finding that an evolving digital landscape requires an IT infrastructure that is adaptable, flexible, and agile.

Read More

How Businesses Can Defend Against Ransomware and Cyberattacks

It goes by names like WannaCry, Locky, and CryptoLocker, and if the computers in your workplace were infected with one of these, or the many other variants of ransomware, you would know almost immediately. It generally starts with an email that asks you to download and open an attachment or enable macros on a document. Once you comply, the malware starts running in the background and encrypting all of your files using asymmetric encryption so that you cannot open and view them without the decryption key. Of course, that key is only made available to you once you pay the hacker the ransom; details for payment are made available to you via the new background the malware has set up on your computer.

Read More

Ransomware Protection for Businesses

While most everyone in the digital era is aware of malware, this term covers a number of different threats, but the one attack method that is leading the pack today is ransomware. Ransomware attacks quadrupled in 2016 and will double again in 2017, according to a report issued by Beazley, a provider of data breach response insurance. It’s now the most profitable type of malware attack in history.

Read More

3 Tools to Ensure Your Data is Secure

According to the Business Continuity Institute’s 2017 Horizon Scan Report, cyber attacks and data breaches are the top two threats facing businesses. As these threats continue to evolve, becoming increasingly more complicated and sophisticated, organizations must proactively manage their IT services in order to protect their business, clients, and data. We’ve written about three innovative technologies that can help protect you against the ever-evolving threat of cyber crime.

Read More

Essential IT Applications for Small-Business Owners

There are many resources that lend themselves to the success of a small business. There are the people who do the things, computers and networking infrastructure, creative marketing initiatives, and a strong sales team. However, all of these resources rely on certain tools to get their jobs done. Those tools are the IT applications that they use day in and day out. While certain industries may rely on specific solutions, there are some that every small-business IT department needs to have in place in order to stay competitive these days.

Read More

The Best Certifications for Boston IT Professionals

According to a research report from global staffing and workforce solutions advisor SIA, IT employment in the US has increased more than 36 percent, compared to a 7.5 percent increase for total employment, over the last 15 years. That’s far from surprising in the digital economy in which every business now operates. To meet the needs of the various sectors, today’s IT specialists must be well-versed in providing the latest technology hardware, software, and platform implementations via comprehensive IT certifications. 

Read More

Organizational Benefits of Outsourcing Specialized IT Functions

Oftentimes, when discussing outsourcing IT services, the main point made in its favor is the costs savings that are bound to come with it. For this reason alone, many companies are quick to embrace this practice. However, there are many other benefits that come from outsourcing IT services, especially when it comes to specialized IT functions. If cost savings or, even better, cost control aren’t enough to encourage your company to take a serious look at outsourcing, these added benefits may just tip things in your favor. 

Read More

The True Cost of Legacy Technology

The recent Bloomberg News article detailing the failure of the Delta Airlines worldwide computer network is just one of many examples of how legacy technology can bring major costs. With hundreds of flights disrupted due to power and computer system failures, the airline was looking at a 10 percent reduction in 2016 3Q earnings.

This is an all-too-common occurrence for the biggest and the smallest businesses. Primarily because it becomes difficult to see impending challenges from legacy technology even as some systems are upgraded.

Read More