<img alt="" src="https://secure.hims1nice.com/151009.png" style="display:none;">
" style="background-color: #2c3e50;">
 

Blogs

Does the SolarWinds breach have you searching for a new Systems Monitoring solution?

Posted by Curtiss Adams on Feb 10, 2021 3:53:43 PM
Read More

Topics: Security, Systems Management

Understanding the Limitations of Authentication Session Management with Conditional Access

Posted by William Crawford on Dec 4, 2020 1:00:00 PM
Read More

Topics: Security, Systems Management

Benefits of Azure for Small to Medium Business

Posted by Brad Watson on Nov 24, 2020 12:39:00 PM
Read More

Topics: Azure, Security, Disaster Recovery

Don’t Let IT Challenges Distract Your Business

Posted by Brad Watson on Nov 23, 2020 12:28:00 PM
Read More

Topics: Security, Business Continuity, Managed Services

Protecting Your Browser Session with Isolated Sessions

Posted by Timothy Morimanno on Oct 26, 2020 10:45:00 AM
Read More

Topics: Security, Microsoft Edge

Auditing role assignments with Privileged Identity Manager (PIM)

Posted by Tom Kozel on Oct 19, 2020 10:00:00 AM
Read More

Topics: Azure, Security, cloud security

Is Microsoft’s new Edge the right choice for your organization?

Posted by Timothy Morimanno on Oct 14, 2020 12:10:17 PM
Read More

Topics: Security, Windows 10, Business Productivity, Microsoft Edge

Healthcare Security Demystified

Posted by Brandon Stephenson on Mar 26, 2018 4:37:59 PM

Securing Applications and Data

For both traditional on-prem solutions and cloud-based solutions, how should organizations act to secure their data and applications?

When talking with IT service providers working in the healthcare space, we’ve found a few concerns repeated:

  1. My organization has become heavily security conscious after the malware attacks, but we’re not sure where to focus.
  2. Our leadership wants us to adopt cloud infrastructure and platform services, but our security team is preventing that as they are not sure of the security.
  3. As our development teams are building products, such as SaaS offerings for clients or other solutions, we are not sure what modern tools work for managing the infrastructure and apps involved.

Collectively, these concerns all engage in the shared idea of security and operations. 

 

Read More

Topics: Security, cloud security, healthcare

Ransomware in Healthcare Organizations [is your patient data safe]

Posted by Brad Watson on Apr 28, 2017 11:57:31 AM

 

In the 2nd quarter of 2016, 88% of all ransomware attacks targeted healthcare entities.  In one high-profile case, Hollywood Presbyterian Medical Center in Los Angeles paid $17, 000 in bitcoin to restore their files

So what makes healthcare organizations such an attractive target?  There are several contributing factors.

Read More

Topics: Security, Disaster Recovery, Business Continuity

Your Operating System Could Be Killing Productivity

Posted by Curtiss Adams on Feb 14, 2017 12:33:40 PM

Generally speaking, companies must weigh the pros and cons of upgrading or updating any system.  It is accepted that physical assets such as machinery or equipment must be maintained at specific intervals.  

Furthermore, the projected end of life date is typically established at the time of purchase.  Equipment kept in use past its projected EOL requires additional maintenance and upkeep and often hampers productivity or increases risk and most companies would not dispute this fact. 

Software systems are no less critical. Software applications and operating systems also have a projected EOL, but often the temptation to extend the service life of these assets is greater than for a piece of equipment that you can touch and feel. 

Read More

Topics: Microsoft, Security, Windows 10