Security & Risk Mitigation

WAN Router Lifecycle Strategy

WAN Router Lifecycle Strategy

Many businesses are in a cycle where it’s time to replace the majority of their routers. Typically, these routers are the ISR G2 (2900 and 3900 series). These products have been solid, battle-tested and reliable, but are soon end of life – the absolute last date of support is December 2022. If you haven’t already, …

WAN Router Lifecycle Strategy Read More »

Privileged Access Workstations: Securing Administrative Tasks

Privileged Access Workstations

Many companies are trying to better secure their administrative tools and sensitive data. Leveraging Privileged Access Workstations (PAW) is a good way to reduce the threat vector on these sensitive tasks and systems. PAW are separate client computing environments that can take advantage of added security measures like multifactor authentication (see our post on Six Design …

Privileged Access Workstations: Securing Administrative Tasks Read More »

Exploring Your Technical Options after a “Work From Home” Mandate

Creating a strategy your work from home user base.

It’s finally happened…your company’s leadership came to you and asked what it will take to enable your entire workforce to work from home for the foreseeable future due to the Novel Coronavirus (COVID-19).  How are you going to provide a computing environment for all these remote workers, and fast?  Let’s talk through the benefits associated …

Exploring Your Technical Options after a “Work From Home” Mandate Read More »

Cloud Readiness: Today’s Technical Elements to Prepare You for Tomorrow

Focus on your direction to be intentional about the journey.

So that’s it…you’re going to the cloud. This may not be your decision. It may be directed by a suit in an office somewhere. Other cases see operationally minded CIO’s acting quickly to ensure their technical teams are best aligned for the road ahead. And yet, others have done their homework and have determined a …

Cloud Readiness: Today’s Technical Elements to Prepare You for Tomorrow Read More »

Leveraging Microsoft’s Identity Management Platform to Secure Your Business

Avoid a tangled web of chaos by being intentional with your Identity Management

Over the past few weeks, we’ve covered a broad range of security-focused basics that you can implement to strengthen your security posture. Today, we’ll dive deeper into strengthening your security posture via the Microsoft’s Identity Management platform. As the Microsoft toolset used to manage Identity has evolved over the past few years, the ease of …

Leveraging Microsoft’s Identity Management Platform to Secure Your Business Read More »

Considerations When Deploying Network Access Control

Who has the keys to access your network?

Network Access Control Overview Today we look at deploying Network Access Control (NAC) and five considerations to explore before implementation. Network Access Control is a solution that applies and enforces network access policies. In its most basic implementation, NAC is the decision maker of what devices are allowed on the network. NAC is implemented in …

Considerations When Deploying Network Access Control Read More »

Aligning Your Technical Design and Execution to Improve Your Security Posture

Improving your security posture

We continue our journey today on aligning technical design and execution in order to improve your security posture. This week, as I sat at dinner with a long-time IT friend, his phone rang. It was his sister. She works at a financial services organization and had not been to work all week. “We have been …

Aligning Your Technical Design and Execution to Improve Your Security Posture Read More »

The Advantages of Leveraging a Cloud-Based Data Management Strategy 

The technical advantages of leveraging a cloud-based data management strategy

Why Cloud Makes Sense for Data Management  Today’s cloud landscape continues to offer new opportunities for organizations to deliver enterprise services in new and advantageous ways. In Four Simple Methodologies to Modernizing Your Data Management Strategy, we discussed the importance of leveraging solutions that have intentional, cloud native integrations. A cloud-based data management strategy has many advantages. Below, we will work to highlight …

The Advantages of Leveraging a Cloud-Based Data Management Strategy  Read More »

Four Simple Methodologies to Modernizing Your Data Management Strategy

In today’s multi-cloud world, we’re often faced with the tough decisions of creating a long-term strategy fit within existing architectural decisions. How do we properly evaluate the best options that fit within our strategic goals? Sometimes this is easier said than done. It’s also important to realize that infrastructure modernization becomes an important part of …

Four Simple Methodologies to Modernizing Your Data Management Strategy Read More »

5 Beginning Steps to Ensure Your Backups are Protecting Your Data from Ransomware

Protecting your data from ransomware starts with visibility of your data assets

A quick Google search on recent ransomware events will highlight the sad state of our current world. Our data has monetary value. Those who can hold it hostage are able to extract a financial sum for its (supposed) return. Managing your data assets properly is becoming a vital skill. Unfortunately, protecting your data from ransomware …

5 Beginning Steps to Ensure Your Backups are Protecting Your Data from Ransomware Read More »