IT Infrastructure

Are You Burning Money with Unrealistic RPOs and RTOs?

Posted in Agriculture | Construction | Government | Managed Services | Managed IT Services | Manufacturing & Distribution | Not-for-Profit | Oilfield Services | Technology | IT Consulting | IT Infrastructure | Strategic IT Planning on February 13, 2015

What happens when a major event or catastrophe happens to your organization’s network? It’s time to follow the Recovery Point Objective (RPO) and Recovery Time Objectives (RTO) protocols. [More]

Protect Your Not-for-Profit Against These 13 Damaging Risks

Posted in Accounting, Audit and Tax | Managed IT Services | Outsourced Human Resources | Not-for-Profit | Technology | IT Infrastructure on January 14, 2015

In 2012, a well-known foundation ran into a series of dilemmas, from eliminating much-needed community grants to increasing its CEO’s salary by 64 percent. These events created distrust among the foundation’s supporters, leading to a decline in active participants and monetary contributions. [More]

Internet Statistics: How Big is the Internet?

Posted in Technology | IT Infrastructure on August 1, 2014

The enormity of the Internet has always fascinated me. It is difficult to find a single metric that quantifies its size, but nevertheless there are interesting statistics that help one grasp the vastness and pervasiveness of the Internet and related technologies in our society. Here are seven statistics to demonstrate just how vast and pervasive it is. [More]

How Are Oil and Gas Executives Using Big Data?

Posted in Microsoft Dynamics NAV & NAV-X | Oilfield Services | Business Intelligence | IT Infrastructure | Strategic Technology on May 15, 2014

Big Data is information captured during every activity in oilfield services, including real-time analytics during production, consumer insights, weather patterns, crude quality, and market demand. Harnessing big data provides oil and gas companies the necessary information to achieve operational excellence. Here are four areas oil and gas executives are using big data. [More]

Will Wireless Electricity Become the New Trend?

Posted in Strategic Advisory | Technology | IT Infrastructure on April 21, 2014

We are almost free of wires. Bluetooth, Wi-Fi, cellular service and other radio frequency protocols have made many of our devices wireless, giving us wireless Internet connectivity, video, printers, light controls, garage door openers—the list goes on. There is still one omnipresent wire: we remain tethered to the wall for electricity when batteries are inconvenient or insufficient. What if the delivery of electricity could be wireless? [More]

The Heartbleed Bug: What You Need to Know Now

Posted in Technology | IT Infrastructure | Security on April 9, 2014

While Microsoft’s push of the final patches for Windows XP might normally be seen as a big deal, a vulnerability in the OpenSSL library has managed to steal the spotlight. CVE-2014-0160, which is more commonly referred to as the “Heartbleed” bug, has revealed that it is possible for a malicious user to retrieve memory that could include sensitive data or even the private encryption keys from web servers running OpenSSL versions 1.0.1-1.0.1f and 1.0.2-beta1. Our security and compliance team has been able to exploit this vulnerability, which means attackers can as well. [More]

Five Things a Security Expert Wouldn't Do Online

Posted in Tech Tips | Technology | IT Infrastructure | Security on January 3, 2014

If holiday shoppers learned one thing this past season, it was that cyber attacks and data breaches can happen whenever, wherever. The December 2013 cyber attack on Target stores compromised as many as 40 million credit and debit card accounts, proving that cyber attacks don’t just happen when someone gets a hold of your email account. I asked our director of information risk management (aka security guru), Mark Wilson, what five things he would never do online. [More]

Creating and Enforcing an Adequate Password Policy (Part 2)

Posted in Technology | IT Infrastructure | Security | Strategic IT Planning on October 25, 2013

Still prevalent are systems that require only a user name and password to gain access to privileged information. Unfortunately, there are thousands of hackers worldwide anxiously and actively attempting to steal or circumvent this weak form of security. This is a lucrative attack vector for the hacking community and will continue to be a popular exploit until the user community becomes more aware of this formidable threat. Not until the user community recognizes the threat and discontinues the use of weak passwords will this attack vector begin to abate. [More]

Creating & Enforcing an Adequate Password Policy

Posted in Tech Tips | Technology | IT Infrastructure | Security on October 16, 2013

One of the most frequently used access control mechanisms is the simple password. Entering a password that is subsequently compared to a record in a “private” data repository often is the only mechanism used to both identify a user and authorize a user to access a program. It can be a very weak form of security if appropriate password policies are not created and enforced. [More]

How to Use VirusTotal to Find Malicious Software: Part 2

Posted in Tech Tips | Technology | IT Infrastructure | Security | Strategic IT Planning on September 17, 2013

The capabilities and utility of VirusTotal are impressive—enough in fact that Google recently purchased the company. However, as with any tool, it can be used for good or for ill. In the latter case, when an attacker deploys a piece of malicious software (perhaps as an email attachment), they hash the file first. Read on to understand what a hash is, how it works and how to calculate its value. [More]

Windows XP Expiration Date: A Great Opportunity for Your Organization

Posted in Technology | Cloud & Hosting Solutions | IT Infrastructure | Virtualization | Strategic IT Planning on September 12, 2013

According to several articles in online technology magazines, 38 to 45 percent of PCs connected to the Internet are still on Windows XP. This is, to be blunt, not good. In case you haven't heard, Windows XP is on its way out. On April 8, 2014, Windows XP will reach end-of-support, meaning it will no longer receive critical updates or patches to protect your computer and your network from dangerous malware, viruses and spam. [More]

How to Use VirusTotal to Find Malicious Software

Posted in Technology | IT Infrastructure | Security | Strategic IT Planning on September 9, 2013

For those of us who watch technology in the news it is apparent that our networks are under an increasing load of attacks ranging from the automated to the highly personal. As a network defender―whether in a technical or managerial/oversight role―it is easy to get swept up in the allure of various vendors selling a technological magic bullet to protect your network. And while those blinking light boxes can be very effective at what they do, they are not the only tool available. [More]

XP End of Life: What Does This Mean for Your Business?

Posted in Technology | IT Consulting | IT Infrastructure | Strategic IT Planning on April 17, 2013

Windows XP ran longer than any other Microsoft operating system, but it will no longer be supported next year. What does upgrading mean for your business? [More]

Let's Talk Tech: What is a Network Operations Center?

Posted in Managed IT Services | Core Technology | Managed Security | Total Technology | Technology | Cloud & Hosting Solutions | IT Consulting | IT Infrastructure | Disaster Recovery & Business Continuity | Mobility | Network Design & Management | Virtualization on April 4, 2013

A primary component of any IT managed services is the Network Operations Center (NOC), but many non-IT people understand the term. Learn about a NOC in this short video. [More]

©2017 All Rights Reserved.
Disclaimer: This material has been prepared for general informational purposes only and is not intended to be relied upon as accounting, tax, or other professional advice. Please refer to your advisors for specific advice.