<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

OUR BLOG

Transitioning from Microsoft  Exchange Server 2010

Posted by Keith Shaffer Mar 28, 2019 3:15:10 PM

Microsoft Exchange 2010 is one of the most popular and utilized email and calendar servers amongst businesses. Since its release in 2010, it has had rapid international adoption and it has become an essential enterprise tool for sending emails and utilizing calendar servers to set up meetings and plan out business days. Although many companies have become accustomed to Exchange 2010 by now, it is coming to a screeching halt in less than a year. If your organization is not proactive about transitioning away from Exchange 2010 before 2020, the consequences can be extremely costly.

Read More

Topics: Cloud Computing, Outsourced IT Support, Server Migration

Do Managed Cloud Solutions Work for Nonprofits/Not-for-Profits?

Posted by Keith Shaffer Feb 15, 2019 2:11:29 PM

Cloud solutions have become the norm for both for-profit and nonprofit organizations alike. TechSoup found 90% of nonprofits surveyed have adopted some sort of cloud technology.

Read More

Topics: Cloud Computing, Cyber Security, Outsourced IT Support, Enterprise Mobility Management (EMM), Non Profit

Data Breach Scenario: Malicious Software - Financial Services Firms

Posted by Keith Shaffer Nov 13, 2018 4:00:11 PM

According to research from the Verizon RISK Team, few breaches are unique, meaning the vast majority of incidents are caused by a small number of scenarios. Verizon classifies 18 different data breach scenarios into four groups; the human element, conduit devices, configuration exploitation and malicious software. For the purposes of this article, we will focus on the malicious software that makes institutions vulnerable.

Read More

Topics: Cloud Computing, Cyber Security, Network Safety, Malicious Software, Data Breach

Data Breach Scenario: Malicious Software

Posted by Gabrielle D'Andrea Jun 19, 2018 10:04:57 AM

According to research from the Verizon RISK Team, few breaches are unique, meaning the vast majority of incidents are caused by a small number of scenarios. Verizon classifies 18 different data breach scenarios into four groups; the human element, conduit devices, configuration exploitation and malicious software. For the purposes of this article we will focus on the malicious software that makes organizations vulnerable.

Read More

Topics: Cloud Computing, Cyber Security, Network Safety, Malicious Software, Data Breach

4 Ways Your MSP Enhances Your Move to the Cloud

Posted by Keith Shaffer May 19, 2017 8:00:00 AM

As more organizations make the move to the cloud, they are questioning the role their managed services provider (MSP) plays within their overall IT strategy. Far from reducing their dependence on managed services, however, smart organizations are realizing that careful leveraging of an MSP is critical to their cloud success.

Once seen strictly as a way to reduce infrastructure costs or offload mundane IT tasks, today’s MSPs have morphed to become true business partners, especially for organizations making the leap to the cloud. Research from CompTIA finds that just 30% of MSP users cite cost savings as a primary driver, down from 57% just one year prior. Instead, organizations expect far more from their MSPs, moving beyond simple endpoint or server management to higher level information/data management. They increasingly want their MSPs to manage disparate on-premise, cloud, social, and network services, and more just over half (52%) say they have worked with an MSP on their most recent cloud initiatives.

 

Read More

Topics: Cloud Computing, Cyber Security, Network Safety, Data Protection, MSP