Posted: Tuesday, May 12, 2020

Is Pandemic Readiness the New DR plan for IT?

Is Pandemic Readiness the New DR plan for IT?

IT organizations have been working hard for the last 20 years developing and updating their Disaster Recovery Plans.  An effective DR plan included strategy for remote working, oftentimes presumed to be caused by a local geographical constrained issue around an office or area. 

The COVID-19 pandemic has global impact and the most readily felt impact on many IT departments pertains to physical distancing.  This includes resources not able to travel to the office, supply chains being disrupted and business processes being changed.  IT departments and organizations that are further along the digital transformation journey are likely to be less negatively impacted by COVID-19.

Read more »

Number of views (551)

Posted: Monday, May 11, 2020

COVID-19 and Ransomware: Are your backups ready in case of an attack?

COVID-19 and Ransomware: Are your backups ready in case of an attack?

With the drastic changes that our society has felt on a global scale since the onset of the COVID-19 pandemic, it's no secret that a 'new normal' is materializing in real time. Organizations have had to rapidly adapt to remote working models on a moment's notice. This change has also inadvertently created a haven for hackers to take full advantage of potentially vulnerabe systems and unsuspecting workers with a significant rise in phishing and ransomware attacks with rhetoric related to COVID-19 as the primary hook to lure people in. We published a post a few years on what to look out for in the event of a ransomware attack and the precautions are no different today.  

Read more »

Number of views (12918)

Posted: Wednesday, June 28, 2017

The Latest Wake Up Call:  Is Your Data Protected Against Ransomware?

The Latest Wake Up Call: Is Your Data Protected Against Ransomware?

Today, news broke of new threat called "Petya" , the latest in a disturbing trend of ransomware attacks worldwide. It is becoming one of the top types of Malware and the sophistication of these types of attacks are ever increasing.  These latest global attacks, including the the recent “WannaCry” attack are examples of the sophistication of these threats  This Ransomware was combined with a worm-like behaviour that aided the spread of the malware based upon OS vulnerabilities.  

Read more »

Number of views (8216)

Posted: Thursday, May 4, 2017

How to Make Network Compliance Reporting Bearable

How to Make Network Compliance Reporting Bearable

What is your Network Compliance Story?

More and more customers are challenged with incorporating the requirement to provide compliance reporting into their business.  This is primarily driven by audit, regulations, standards, etc. However, many customers have deployed their network components at different times, with different hardware based upon best product availability and price.  Furthermore, standards were not defined on configurations and oftentimes each unit was configured separately.  

Read more »

Number of views (9187)

Posted: Wednesday, March 2, 2016

Considerations for Cloud Managed Network Infrastructure for Your Enterprise

Considerations for Cloud Managed Network Infrastructure for Your Enterprise

In recent years the cloud managed WLAN has taken off in popularity.  So much so that many of the traditional WLAN vendors have developed various forms of cloud based management to compete with the native cloud based infrastructure providers such as Cisco Meraki and Aerohive.  Additionally, Cisco Meraki – which is a leader in cloud managed solutions, offers LAN and Security edge appliances to complement their WLAN offerings. 

Read more »

Number of views (11768)

Posted: Monday, July 15, 2013

Key considerations for a secure and efficient network to support BYOD

Key considerations for a secure and efficient network to support BYOD

Bring Your Own Device (BYOD) is a significant challenge that you face today. You are now expected to manage your network like a juggling act with new and different devices being added to the mix every day. That is what managing a separate wired and wireless network is like.

 

Read more »

Number of views (10389)

CategoryID: