<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2923012&amp;fmt=gif">

Blog Categories

5 AWS security best practices for small businesses

Amazon Web Services (AWS) offers small businesses a number of benefits. There are plenty of Amazon Machine Instances that are preconfigured so a small IT team can quickly spin up a virtual appliance, server, or other computing resource. Like any other cloud service, AWS offers scalability to allow business IT resources to grow on demand and it helps control costs by offering a number of different pricing plans. There are, of course, other benefits that entice small businesses to turn to AWS for a number of their computing needs. However, like any other resource, there are security considerations that you need to make.

The following list outlines five of the most important best practices any small business needs to consider when using AWS in their environment.

Read More

What Types of Security Threats Do Small Businesses Face?

When it comes to choosing a victim, cybercriminals often look for low-hanging fruit. They seek the path of least resistance to keep their chances of success high and of getting caught low.

This is why so many criminals target small- to medium-sized businesses (SMBs). It is no secret among SMBs that they are frequently targeted by attackers. In fact, a research report from the Better Business Bureau shows that 87 percent of SMBs are aware that they are not safe from cybercrime. Despite this awareness, cyberattacks cost SMBs an average of $2,235,000 in 2017. This means smaller companies are still failing to properly secure their assets.

Read More

Preparing for an Office 365 Migration: What You Need to Know

Preparing for an Office 365 migration will help ensure that your implementation process is as seamless, efficient, and effective as possible. However, with so many moving parts to consider, it can be difficult to know where to begin. We’ve laid out three things you should know before kicking off your Office 365 migration.

Read More

We need Log Management!

Yes, you heard that right, the boss said, “We need Log Management!” And he’s right but what does he mean? Isn’t that the horribly complex software that is only needed by huge corporations? And why is he saying it now? Did something happen?

Read More

5 Myths About An Office 365 Migration

As you prepare for an Office 365 migration, there are a lot of moving parts to consider—and a lot of misleading information to sift through. To help you stay informed and effectively plan decisions, we’ve identified five common misconceptions about Office 365 migrations.

Read More

3 Essential Components of Your IT Security Roadmap

Businesses that lack adequate data security are exceptionally vulnerable to cyberattacks. They’re also are more likely to experience problems associated with mismanaged, unorganized, and insecure data. If you don’t have an IT security plan in the modern age, you’re exposing your business to unnecessary risk and liability. A comprehensive IT security strategy can help you protect your business, your customers, your data, your viability, and your integrity. We’ve laid out three essential components of an IT security roadmap to help you protect your company and plan for the future.

Read More

Two Factor Authentication – Buy, Borrow or Loot

Two Factor Authentication (2FA) or Multi-factor Authentication (MFA) is the most common preventative measure that companies and organizations implement as an additional layer of security to the standard username and password login credentials on a website or application. Taking a half-step back, 2FA/MFA can be described as something you know and something you have. 2FA/MFA is currently used on almost every application, from banking websites to SaaS services to video games

Read More

Two Factor Authentication for Office 365 (Part 2)

From a Microsoft Azure Active Directory perspective, there are two approaches to MFA:

1. A laser accurate approach specific to the application in the Azure blade using conditional access

2. A global approach managed through the “Multi-factor authentication” page via Office 365

Read More

Boston Technology Conferences: Local Events to Attend in 2018

While every year brings new challenges for CIOs, CTOs, IT teams, and businesses overall in the expanding digital landscape, there are also countless opportunities to learn how to overcome those challenges with new technology and approaches. With the numerous Boston technology conferences available, businesses can learn more about the industry and opportunities from experts, peers, and specialists.  

Read More

5 Criteria for Choosing an Operational Intelligence Platform

In a recent HFS/Accenture Study of 460 enterprise operational executives from across the globe, 96 percent of respondents said predictive decisions based on real-time data are the biggest drivers impacting business. This sample is a clear indication of the impact of operational intelligence in a data-driven world.

Read More