Patch Management Best Practices for Critical Vulnerabilities

By Steve Brown | January 18, 2018

Patch Management Best Practices for Critical Vulnerabilities

With the recent Spectre and Meltdown flaws sending a wave of disruption across IT and all business communities, the scope of the problem continues to unfold. Either one or both of the flaws are present in Intel chips from the last 15 years embedded in countless processors running PCs, servers, and phones.

Read More >

How Managed Backup Services Can Prevent IT Downtime

By Marc Saetta | December 14, 2017

Everyone, by now, knows that backing up important files is one of the most important steps to take to reduce IT downtime.

Read More >

4 Critical AWS Cost Optimization Tactics

By Ryan Visconti | September 21, 2017

Organizations often turn to cloud solutions because of the flexibility that “as a service” offerings provide. If you need more computing power, storage space, bandwidth, licenses, etc., those resources are rapidly at your disposal. There is no need to buy new hardware, install software, or upgrade your infrastructure to handle it, because your cloud service provider has it ready for you to meet any growth. Unfortunately, when these resources are so easy and quick to spin up, costs start to rise proportionately.

Read More >

Why Small Businesses Need to Migrate to Office 365

By Jason Pinardi | November 29, 2016

While technology holds great promise of productivity increases and growth for small businesses, they often feel that budget constraints put the most advantageous of those technologies out of their reach. The fact of the matter is that Office 365 can eliminate those roadblocks to productivity and affordability. Still, as a small business, you may ask: Why migrate to Office 365?

Read More >

6 Warning Signs That It’s Time to Update Your Business IT Solutions

By Ryan Visconti | August 25, 2016

For business owners and the workforce, IT is generally something they prefer not to think about unless something goes wrong. While the ideal scenario is to ensure that they can put all their concentration into running the business, a lack of IT awareness can lead to telltale signs that something is wrong. Here are six warning signs that indicate it’s time to update your business IT solutions.

Read More >

Shellshock Alert!

By Ryan Visconti | September 26, 2014

The Shellshock exploit is a major security concern for many critical datacenter components. Below is an initial list with links to articles for a few of the components that you may/may not have in your environment.

Read More >

Did you know about the Rutter Colocation?

By Ryan Visconti | January 15, 2014

If you were unaware, Rutter Networking has a colocation at the Markley Group in Boston, MA. Located on Summer Street in downtown Boston, the Markley group Data Center is New England’s largest and longest operating data Center. The location of the Markley group allows it to be at right in the middle of all major fiber routes in New England allowing it to have unmatched performance, low latency and the lowest costs.

Read More >

Welcome our new partner SolarWinds Inc.!

By Ryan Visconti | December 11, 2013

Rutter Networking Technologies is pleased to announce its newest partner, SolarWinds Inc. SolarWinds is a powerful and affordable IT management software to customers worldwide – from Fortune 500 enterprises to small businesses. As a software provider that can scale across various size companies, SolarWinds provides customers downloadable, easy to use, maintain, and provide the power, scale, and flexibility needed to address users’ management priorities.

Read More >

Identity Management: The Rutter Solution

By Ryan Visconti | September 13, 2013

One of the common questions that arises in the IT industry today, what is Identity Management? Identity Management (IDM) is having governance or policy over who has access to what information out of your existing users.  The old way of giving users within your environment access to certain servers, files, etc. was on an as-need and individual basis. Applying governance on an individual basis meant an IT resource would manually have to provision rights for users. As technologies in companies swell, the likelihood of mistakes using a manual process would only increase with time. This is not only time consuming, but hard to manage. It also introduced points of vulnerability in guaranteeing compliance with standards such as HIPPA, Sarbanes Oxley and so on.

Read More >

1st #RNTChat -- August 22nd at 1PM -- Mobile Device Management (MDM)

By Ryan Visconti | August 5, 2013

How many ‘smart’ devices do you own? A Smart Phone? A Tablet? A Laptop? An e-reader? If you’re like most people, the answer is all of the above. As devices have become smaller, versatile, and more affordable it’s not all that uncommon for people that own these devices to use them both at home and in the workplace. However, this industry trend does not come without security ramifications, having more devices increases the need for the security and management.  A lost Smart Phone or tablet could put your personal and business data at risk and expose sensitive information to unauthorized individuals.

Read More >
Request a One Hour Security Vulnerability Assessment
For a limited time Rutter Networking Technologies is offering a free, no strings attached, one hour consultation with one of our experts for your IT security roadmap needs.
Request Consultation