<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=162429800880729&amp;ev=PageView&amp;noscript=1">

The Tech Break

Vulnerability Management: The Good, The Bad, & The Ugly

Mar 14, 2018 / by Matt Hannula posted in Cyber Security, Security, CISO

 

Read More

Microsoft's Azure Stack: An On-Prem Cloud Solution

Jul 06, 2017 / by Chelsea Alves posted in Cloud, Storage, Microsoft, Azure, Security

 

Microsoft has long been a trusted brand, consistently releasing products that vastly improve the technology sector. As certain industries and larger companies continue to seek ways to keep their data secure, Microsoft has in turn updated their product offering to assist with this growing concern.

Read More

6 Tips For a Complete Threat Defense

Mar 27, 2017 / by Matt Hannula

We have all heard the statement loved by security folks, is not a question of “…if you will get attacked.” it is a question of “…when will you get attacked.”

Read More

Why Do We Battle Our IT?

Mar 12, 2017 / by Matt Hannula posted in IT Services, IT Solutions, Cyber Security, information technology, Optimization

Information Technology and the team behind it is more crucial to business than ever before. The old way of doing things has almost completely disappeared and everything is going digital. There are more apps, more mobile users, basically more of everything related to technology and data.

Read More

How are you Protecting your Website?

Mar 02, 2017 / by Matt Hannula posted in WAF, IT, Web Application, Website, IT Services, IT Solutions, Security, Cyber Security

At the end of last year, I went to a Cyber Security event and the keynote speaker Charlie Miller, renowned hacker, talked about vulnerabilities in code. In his opinion, because we are human, we make mistakes and when we make mistakes in writing code (very common) vulnerabilities are created. It is stated that 96% of Web applications have code vulnerabilities (Cenzic). Charlie found one tiny vulnerability in his Jeep which allowed him to hack the vehicle and take control of the steering wheel.

Read More

Cisco Spark: How Are You Building Better Communication?

Feb 27, 2017 / by Matt Hannula posted in IT, collaboration, VOIP, Spark, Cisco, Mobility, BYOD, IT Solutions, Communication

Over the years, technology has allowed us to better collaborate with things such as on-prem phones, smart phones, email, Webex, Skype, and so much more. We use these these products every day and they help us to be more productive in a virtual world where employees and customers are dispersed hundreds to thousands of miles apart.

Read More

Identity Access Management in an Application Driven World

Feb 16, 2017 / by Matt Hannula posted in IT, IT Services, Identity Access Management, Okta, Security, ROI, TCO

Your employees use a ton of applications whether they are web based, cloud based, or on premise. Making sure your users have access to these applications is integral to business productivity. On the other side of things, making sure you have visibility and policy on which applications can be accessed is extremely important to compliance and the overall security posture of your organization.

Read More

SD WAN: BEcoming the Standard

Feb 06, 2017 / by Matt Hannula posted in IT, IT Solutions, IT Services, SD-WAN, Networking, Routing, Cloud, Cloud Expert

I have started to hear SD WAN popping up in conversations and in my news feed so I figured it was time to write a blog on it.

Read More

802.11ac: Is It Time to Invest?

Jan 20, 2017 / by Matt Hannula posted in IT, IT Services, IT Solutions, Wireless, BYOD

There is no one simple answer here. At some point, maybe in 5 years, the time to invest will be “NOW!” But when we talk about investment into 802.11ac, we like to take a slow and progressive approach.

Read More

802.11ac: What is all the Hype?

Jan 20, 2017 / by Matt Hannula posted in IT, IT Services, IT Solutions, Wireless, 802.11ac, BYOD

The news is out. 802.11ac is worlds faster than 802.11n.  Or is it?

Read More

Recent Posts