Converged infrastructure is one of the current buzz words in the IT lexicon. If you browse the web you’ll find a number of documents, articles, posts and vendor claims that tout the benefits of reference architectures, converged and hyper-converged infrastructures. Even though many would hail it as a new paradigm in computer platforms, I would argue it is an evolution that has been developing over the last 40 years.
The BYOD debate is becoming old hat for many mid-market organizations. Some mid-markets have defaulted to allowing their employees to 'Bring Your Own Device' and have accepted some risks.
Small and Medium Business (SMB) leaders need to develop an IT Strategic Plan even if you do not even have an IT department.
If you have a perfect storm of deleted data and no backup, usually the IT department is to blame. Sounds familiar?
This article clears up the difference between a vulnerability scan and a penetration test. Learn how they have different uses but also compliment each other.
Soon after Windows Server Active Directory transitioned into the "cloud" in 2011, Azure Active Directory emerged as its powerful cloud extension offering scalable identity management solutions supported by unified disaster recovery.
Free White Papers
This white paper provides an overview of HIPAA regulation requirements. This includes privacy, security, enforcement and breach notifications related to HIPAA compliance.
Author: Todd Bey, Managing Consultant
DR Risk Assessment
This white paper provides an overview of Equilibrium’s disaster recovery risk analysis and remediation methodology. This methodology was developed over a period of 10+ years by referencing industry best practices.
Author: Glen Hampton, President
This white paper provides an introduction to cyber insurance. This is a modern insurance product in response to modern security problems. Learn how to reduce your premiums.
Author: Todd Bey, Managing Consultant
24/7 Visibility into Advanced Malware on Networks and Endpoints
Eliminating Cybersecurity Blind Spots
Finding Remedies for Healthcare’s Top 3 IT Security Headaches
With so much at stake to keep patients well and research humming while still maintaining financial integrity, healthcare organizations tend to have their hands full when it comes to cybersecurity.
Partner: Tenable Network Security
Malware Defense for Today and the Future
Managing Business Risk with Assurance Report Cards
Security First, PCI Compliance Second
Security Management 2.0: Time to Replace Your SIEM?
Unified Security Monitoring Best Practices
Microsoft Azure White Papers
Aerohive White Papers
Learn how a smooth storage upgrade project allowed Catherine Cook School to prepare a robust private cloud for its students.
Organization Size: Mid-Market
Customer / Region: Catherine Cook School - Chicago, IL
Read the story of how a strategic planning phase allowed Argo Community High School to gain a major return on investment.
Organization Size: Mid-Market
Customer / Region: Argo Community High School - Chicago, IL
In your private cloud (private datacenter or rented rack), industry standard hardware includes tons of built-in monitoring and diagnostic features which may not be configured.
As a Small or Medium Business (SMB) you may be wondering how you can finally break into cloud computing in a way that provides a great all-around solution that is also scalable and provides a predictable cost. When looking for a solution to network, storage, computing, backup and app ecosystems there are few options that cover all these bases as well as Microsoft Azure.
Social Media has impacted our lives. Social engineering is a modern attack that can exploit those executives with low security awareness.
The new innovation, which will be included in Microsoft Office 365, is named “Skype for Business". This provides a captivating new client experience. Skype for Business will change the way traditional business is being done. It will incorporate the modern experience business leaders strive for.
In this era of remote management, e-mail alerts and advanced monitoring features, we can never forget the basics.
In the area of disk to disk backups, we have customers using tapes for archival or retention purposes.
Congratulations, you have completed a time-consuming disaster recovery test and you have achieved your target RTO and RPO. The DR Plan is well documented. Don't lay it to rest hoping it will work when it is needed the most. Keep your DR plan alive.
Businesses struggle with IT and security because of the rapid pace at which security flaws are discovered and how fast technology in software and hardware are progressing.
Several advanced DNS providers (EasyDNS, DNS Made Easy, etc) provide URL forwarding functionality through the use of a “DNS” record.
One of the most prevalent white hat (and black hat) security tools available is a Linux distribution called Kali Linux. It includes many security scanning, analysis and penetration tools which come preloaded.
A Security Incident Response policy and procedure depends on the business impact related to the incident types. Having a security incident that costs the business millions of dollars must be treated quicker and with more attention to detail to others which are less severe.
This article attempts to clear up the confusion between Authentication and Authorization. They often seem to occur together and seamlessly on a Windows network, but they must be managed separately.
Surveillance software on a mobile phone is one of the most dangerous means of attack. This can be downloaded either form the app store or through a text message.
One of the downfalls of early wireless technology (WEP) is that it suffered many flaws that allowed an attacker to gain access to your network or the ability to read the “encrypted” data stream. Since some older home devices (TiVo's, etc.) do not support WPA or WPA2 encryption, these homes may still be using this outdated encryption scheme.
Defense in Depth helps ensure an organization can prevent or minimize a security breach. This is accomplished by implementing many layers of defense against the progression of an attack.
The basic form of a smart card is something you might see inside your cell phone or PC. Most service providers use a smart card / sim card in order to activate on their network. Some service providers that use smart cards are T-Mobile, AT&T and Sprint.
When we think of a web servers we most commonly think of them being published to the Internet. It is also common for organizations to have internal web servers presenting internal web apps.
Many organization frown upon the use of the "cloud" because they are reducing control compared to a traditional network architecture. One of the biggest fears many organizations hold with cloud offerings if the inability to have complete control over your data or knowing who has access.
When IT admins receive a file restore request after an “accidental” file deletion, there may be no answer available as to who deleted the file. The file is typically restored from last night’s backup and the ticket is closed. The root cause of the issue is never found out: Who deleted the file (and Why)?