<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2923012&amp;fmt=gif">

Blog Categories

Recent Posts by Steve Brown

Stephen Brown is one of the founding partners of Rutter and has been with the company since its inception. His responsibilities include lead technical consulting to customers in the areas of design, installation and support of Perimeter Security systems, Infrastructure Hardware, Intrusion Detection Systems and VPN's. Steve's primary responsibilities also involve the day to day operations of the company including corporate finances. He has been in the consulting/IT industry since 1990 and maintains multiple technology certifications. He holds a BS in Electrical Engineering from University of Massachusetts - Lowell.
Find me on:

Lessons Learned From The AWS Outage

The recent Amazon Web Services outage that took out huge swaths of the Internet a couple of weeks ago has been an eye opener for companies who rely heavily on the cloud. If you ever hope to avoid a similar multi-hour downtime in the future, it would help to pay attention to the crucial lessons we’ve learned from that incident.

Read More

4 Things Your Boss Should Know About Managed Backup Services

Most managers and executives don’t spend too much time thinking about backup and recovery services. They trust that when they log into their computer, their data will be there just like it was when they left it the night before. However, this can be a dangerous way to approach business continuity with all of the different threats and issues that an organization faces these days. 

Read More

The Complete Guide to Massachusetts Information Security Law

When it was passed in 2010, Jones Day called the Standards for the Protection of Personal Information of Residents of the Commonwealth (of Massachusetts) “the most comprehensive data protection and privacy law in the United States.” The law, known as 201 CMR 17.00, was created to protect Commonwealth residents against identity theft and fraud. It requires any companies or persons who store or use personal information about a Massachusetts resident to develop a written, regularly audited plan to protect personal information. This applies to both paper and electronic records.

Read More

The Technology Events Calendar for Boston IT

In today’s digital business landscape, technology is driving both innovation and operational efficiency in new and unprecedented ways. It’s no longer enough for CIOs, CTOs, and IT specialists to stay abreast of these emerging changes. Now the entire business—including the entire C-suite, as well as key management across the enterprise—must stay in touch with IT changes and challenges.

Read More

Considerations for Defending Against Malware and Zero Day Threats

Gone are the days when antivirus software was enough to protect digital assets against IT security risks. Today, you need more effective defenses against the large majority of malware, zero-day, and other threats that are out there. But with a limited budget and/or in-house (cybersecurity) talent, it’s not always easy to determine which security solutions should be given top priority.

Read More

The Ultimate Guide to Using Veeam for Cloud Backup Services

Using virtual machines (VMs) in your infrastructure makes sense from a cost perspective, because physical server costs are lower and resources are used to their capacity. If additional resources are needed, a new server is simply spun up. The ease of maintenance also makes virtual servers attractive to most IT departments. If a VM should fail, you simply spin up a new one. However, in order for true continuity, you will need to ensure that the new server is restored from the one it replaced exactly.

Read More

What Is Operational Intelligence? 5 Things to Know About Splunk

According to IDC, 42 percent of all data will be machine-generated by 2020, which includes data from sensors, security systems, networks, servers, storage, and applications. Today, most of these data are an untapped potential for making decisions.

Read More

How to Prepare for Your Office 365 Migration


Office 365 offers substantial benefits in business collaboration, agility, productivity, and cost efficiency. However, before you can realize those benefits, you’ll need to go through Office 365 migration - a complex and arduous process that requires careful planning and preparation.

Read More

4 Considerations for Securing Your Virtual Environments

Virtual networks and infrastructure differ in many ways from their physical counterparts. Increased flexibility, ease of provisioning and lower cost are some of the attributes that make virtualization a practical choice for many types of businesses. A virtual infrastructure requires a shift in thinking, though, especially when it comes to network security.

Read More

The Benefits and Challenges of Using OpenStack In Your Business


OpenStack boosts business agility, availability, and efficiency by providing a platform with on-demand, resource pooling, self-service, highly elastic, and measured services capabilities. If this sounds like cloud computing, that’s because it is. OpenStack is basically your key to building your own cloud infrastructure.

Read More