Office of the CIO

Leveraging Microsoft’s Identity Management Platform to Secure Your Business

Avoid a tangled web of chaos by being intentional with your Identity Management

Over the past few weeks, we’ve covered a broad range of security-focused basics that you can implement to strengthen your security posture. Today, we’ll dive deeper into strengthening your security posture via the Microsoft’s Identity Management platform. As the Microsoft toolset used to manage Identity has evolved over the past few years, the ease of …

Leveraging Microsoft’s Identity Management Platform to Secure Your Business Read More »

Incorporating Modern Network Design Principles

Incorporating Modern Network Design Principles

Several of our clients have come to us recently seeking help with network design. Be it a new facility, or a simple refresh of their switching environment, the questions and desire for support is all the same. As the technology stack changes, our need to align to modern network design principles must shift with it. …

Incorporating Modern Network Design Principles Read More »

Considerations When Deploying Network Access Control

Who has the keys to access your network?

Network Access Control Overview Today we look at deploying Network Access Control (NAC) and five considerations to explore before implementation. Network Access Control is a solution that applies and enforces network access policies. In its most basic implementation, NAC is the decision maker of what devices are allowed on the network. NAC is implemented in …

Considerations When Deploying Network Access Control Read More »

Aligning Your Technical Design and Execution to Improve Your Security Posture

Improving your security posture

We continue our journey today on aligning technical design and execution in order to improve your security posture. This week, as I sat at dinner with a long-time IT friend, his phone rang. It was his sister. She works at a financial services organization and had not been to work all week. “We have been …

Aligning Your Technical Design and Execution to Improve Your Security Posture Read More »

The Advantages of Leveraging a Cloud-Based Data Management Strategy 

The technical advantages of leveraging a cloud-based data management strategy

Why Cloud Makes Sense for Data Management  Today’s cloud landscape continues to offer new opportunities for organizations to deliver enterprise services in new and advantageous ways. In Four Simple Methodologies to Modernizing Your Data Management Strategy, we discussed the importance of leveraging solutions that have intentional, cloud native integrations. A cloud-based data management strategy has many advantages. Below, we will work to highlight …

The Advantages of Leveraging a Cloud-Based Data Management Strategy  Read More »

Six Tips When Navigating O365 Tenant Consolidation and Migrations

Having the right team around you is crucial for migration success

With O365 and its supporting office applications now mainstream, new integrations and migrations are becoming more common place. One we are seeing more of is the consolidation and migration of multiple O365 tenant environments into a single environment. For instance, COMPANY A acquires COMPANY B, and now has to figure out how to consolidate their …

Six Tips When Navigating O365 Tenant Consolidation and Migrations Read More »

Demystifying WiFi 6 – Five Technical Improvements to Consider with the Changing Landscape in Wireless

The changing landscape of wireless connectivity.

A Quick History Lesson Regarding the Changing Landscape in Wireless Over the course of time industry groups, such as the Institute of Electrical and Electronics Engineers (IEEE) and the Wi-Fi Alliance, have driven innovation and improvements for arguably one of the most used connectivity mediums in the world: the 802.11 framework, also known by the …

Demystifying WiFi 6 – Five Technical Improvements to Consider with the Changing Landscape in Wireless Read More »

Four Simple Methodologies to Modernizing Your Data Management Strategy

In today’s multi-cloud world, we’re often faced with the tough decisions of creating a long-term strategy fit within existing architectural decisions. How do we properly evaluate the best options that fit within our strategic goals? Sometimes this is easier said than done. It’s also important to realize that infrastructure modernization becomes an important part of …

Four Simple Methodologies to Modernizing Your Data Management Strategy Read More »

Four Things You Need to Explore Post-VMworld

VMworld 2019 has come and gone, and with it came an impressive array of announcements on everything from containers to hybrid cloud management to smart AI assistants that help guide your new employees through their first few days at work. Let’s take a look at four announcements in particular that are worth a second look …

Four Things You Need to Explore Post-VMworld Read More »

5 Beginning Steps to Ensure Your Backups are Protecting Your Data from Ransomware

Protecting your data from ransomware starts with visibility of your data assets

A quick Google search on recent ransomware events will highlight the sad state of our current world. Our data has monetary value. Those who can hold it hostage are able to extract a financial sum for its (supposed) return. Managing your data assets properly is becoming a vital skill. Unfortunately, protecting your data from ransomware …

5 Beginning Steps to Ensure Your Backups are Protecting Your Data from Ransomware Read More »