The Blog

Improving Identity Security in M365

Oct 14, 2024
Mark Alexander

You can level up your identity management game with Microsoft Authenticator, scoring not only a strong, phishing-resistant solution, but also providing passwordless authentication for your users.

Read Full Article

Black Hat or DEF CON: Which Should You Attend?

Sep 16, 2024
Nick Whittington

Nick takes us inside the two largest infosec conferences to help you decide which is the better use of your time and money.

Read Full Article

Inspiring Secure Collaboration

Aug 12, 2024
John Orosco

Given what's been happening in the world of cybersecurity, there's just not enough being said about how it impacts collaboration. What's happening, you ask? 

Read Full Article

The Importance of Regular Security Audits for Protecting Your Organization from Cyber Threats

Jul 15, 2024
John Parker

Regular security audits help ensure compliance, reduce risks, and improve overall security.

Read Full Article

The Power of Azure Stack HCI

Jun 11, 2024
Jillian Thompson

Even outside of any perceived turmoil resulting from VMware's acquisition, Azure Stack HCI has come to command the attention of those looking for the benefits offered by HCI.

Read Full Article

3 Ways to Inventory Devices in Your M365 Environment

May 13, 2024
Mark Alexander

Microsoft Practice Manager Mark Alexander shares three quick-and-easy methods for inventorying devices that are within reach of anyone charged with managing an M365 tenant.

Read Full Article

Avoiding Unintended Consequences

Apr 15, 2024
John Parker

John Parker outlines 3 common negative side effects arising when making architectural upgrades that can, with planning and careful consideration, be avoided.

Read Full Article

How will AI Disrupt SOC Services?

Mar 18, 2024
David Belkin

AI seems poised to disrupt SOC services. Our Senior Cyber Security Engineer, David Belkin, ponders what such a disruption might entail, acknowledging the dangers that lie ahead.

Read Full Article

Zero Trust VPN

Feb 12, 2024
John Parker

This new alternative to the traditional VPN is positioned to make a huge impact in the market due to its innovative approach to providing remote access to resources within the firewall. And is this intended application as a VPN replacement just scratching the surface of its potential?

Read Full Article

Inside the Firewall: The Critical Role of Asset Discovery

Jan 16, 2024
John Parker

Will you learn of malicious activity within your network in time to contain the damage?

Read Full Article

The Eight Edicts of Castle Fortification

Dec 18, 2023
Nick Whittington

Who knew that looking through a medieval lens could bring the process of building a strategic cybersecurity program into focus?! Our own cyberknight, Nick Whittington, dons his chainmail and lays out a useful outline to follow in the quest to protect your company’s data in a modern world.

Read Full Article

The Only Two Reasons You Should Ever Run Exchange On Prem (and neither is a slam dunk)

Nov 13, 2023
Mark Alexander

While advantages of a cloud architecture apply to more organizations than ever, this decision still isn’t exactly a one-size-fits-all scenario. Let's cut to the chase to see if running Exchange on prem is a legitimate option for you.

Read Full Article

Navigating the Perilous World of “Bring Your Own Device” (BYOD)

Oct 16, 2023
John Parker

Being aware of the risks is a starting point in the effort to mitigate them. Behold the modern world, a melting pot of technologies where BYOD, sadly, doesn’t stand for “Bring Your Own Donuts”.

Read Full Article

Planning for Disaster: From Analyzing Impact to Developing the Plan

Sep 18, 2023
Joe Galvan

Why investing in a comprehensive disaster recovery plan for your organization is more than just an insurance policy.

Read Full Article

Modern Building Blocks of a Strong Cybersecurity Practice

Aug 14, 2023
John Parker

Even with the considerable evolution of cybersecurity technologies and organizational requirements, the essential challenges of a successful cybersecurity initiative haven't aged.

Read Full Article

Aligning Disaster Recovery with Business Priorities

Jul 25, 2023
Joe Galvan

Save time and money during a crisis by using business priorities to plan effectively.

Read Full Article

Minding the Security Gap

Jun 27, 2023
John Parker

Combine Top-Down and Bottom-Up Approaches to Identify and Address Cybersecurity Vulnerabilities.

Read Full Article

Understanding the Value of SD-WAN

May 11, 2023
John Parker

John Parker clears the air surrounding the value and application of SD-WAN when it comes to satisfying a remote or hybrid workforce. The bottom line: Understanding how IT affects the business is the key to determining whether SD-WAN can or should still play a role in your organization’s overall IT strategy.

Read Full Article

Right-Size Your Infrastructure with Workload Profiling

Apr 18, 2023
Joe Galvan

IT systems aren't one-size-fits-all. Prescriptive's Joe Galvan examines the drawbacks of an under- or over-sized infrastructure and reveals how we offer tailor-made solutions that both meet organizational requirements and maximize budget effectiveness.

Read Full Article

LastPass: The Last Straw

Mar 02, 2023
Nick Whittington

After multiple compromising security incidents over the last eight years, is it time to say so long to LastPass?

Read Full Article

The Skinny on SASE

Feb 08, 2023
John Parker

If technologies falling under SASE are nothing new, then why the hype? John Parker, Prescriptive's Network and Security Practice Manager, simplifies SASE and makes clear the real benefit.

Read Full Article

The Quest for Coverage

Jan 11, 2023
Terry Murray

When considering the challenges of protecting your organization from cyber criminals, don't overlook the challenge of securing a quality cyber insurance policy. While good coverage is more widely available than ever, it's harder than ever to qualify for it.

Read Full Article

Combating Impersonation Scams

Dec 06, 2022
Terry Murray

A combination of process and technology is your only hope to preventing those pesky—and often costly—impersonation scams.

Read Full Article

Multifactor Authentication Methods

Nov 07, 2022
Terry Murray

Understanding the role of and options surrounding multifactor authentication within the greater universe of security standardization.

Read Full Article

Homeland Security to grant Cybersecurity Funds to Qualifying State and Local Governments

Oct 04, 2022
Terry Murray

The Department of Homeland Security (DHS) announced a first-of-its-kind cybersecurity grant program specifically for state, local, and territorial (SLT) governments across the country.

Read Full Article

Overcoming Cybersecurity Apathy

Jul 19, 2022
Terry Murray

Insights into why business professionals are often apathetic towards cybersecurity and how to make a strong argument for a healthy cybersecurity budget.

Read Full Article

The Fate (or Destiny?) of VMware

Jun 21, 2022
Terry Murray

Offering perspective on what the future may hold after Broadcom's announcement to buy VMware.

Read Full Article

Making Sense of IT Success

Apr 18, 2022
Terry Murray

Observations across successful IT deployments, and sussing out what differentiates leaders who make the most of information technology in an increasingly complex environment.

Read Full Article

VPN is Dead, Long Live VPN!

Mar 31, 2022
Nick Whittington

(or rather, the Next Generation of Remote Access)

Read Full Article

Backup: Last Line of Defense Against Ransomware

Jan 14, 2022
Joe Galvan

Fighting ransomware through backup modernization and best practices

Read Full Article

Baseline 5 Cybersecurity Readiness

Dec 06, 2021
Terry Murray

Cutting Through Information Overload to Understand the Five Critical Measures for Protecting your Organization from a Serious Cyber Incident

Read Full Article

Protecting your Organization from Ransomware with Bitdefender

Sep 09, 2020
Colby Lopez

While many organizations feel adequately protected, many security suites, including some of the most popular ones, do not effectively protect against these strains of ransomware.

Read Full Article

The Internet Doesn’t Care About Your DR!

Mar 28, 2018
Ian Evans

Today I was looking forward to sitting down and working more on Zerto DR into Azure. I had my schedule (and more importantly my mind) clear and ready to go. I woke up checked email, shuttled the kiddos off to school and grabbed a bite. Everything was ready! Wrong!

Read Full Article

Movie Trailers and Amazing Demos

Mar 20, 2018
Terry Murray

I’m not suggesting demos are bad, just that you shouldn’t become mesmerized by a slick demo. This is particularly important when it comes to Backup and DR to the cloud.

Read Full Article

Remediation of Legacy Backup Tapes

Mar 11, 2018
Terry Murray

Imagine if every time you swapped out an old server you had to keep the old server sitting around and powered up for the next 5 to 7 years. Ridiculous right, but that’s what many organizations do with their legacy backups.

Read Full Article

The Check Box vs the Asterisk

Mar 09, 2018
Terry Murray

One of the most powerful tools in the marketing arsenal is the check box. Does your solution do this? Absolutely, there’s the check box right there! Compare our solution to our competitors? See that, we have way more check boxes.

Read Full Article

BCDR with Zerto 6.0 and Microsoft Azure

Mar 08, 2018
Ian Evans

One of the biggest problems for businesses today is an absence of or gaps in business continuity. Business continuity allows business to continue operating during and after a disaster. A business continuity plan (BCP) is comprised of policies and procedures to help fulfill that goal.

Read Full Article

Docker Volumes Primer

Nov 13, 2017
Ian Evans

One of the most common barriers to Docker adoption for production deployments is a misconception around data persistence, or lack thereof. While it is true that if you remove a Docker container it’s destroyed and the data is lost but that doesn’t have to be the case.

Read Full Article

SolidFire & VMware VVols

Oct 10, 2017
Terry Murray

I recently attended the Netapp Insight conference in Las Vegas. There were a lot of great speakers and sessions but for my money, the best one was Best Practices and Deep Dive for VMware with SolidFire. The presenter for this session was Andy Banta, his title was Storage Janitor.

Read Full Article

The saga of Ansible and the broken Windows Subsystem for Linux (WSL)

Sep 20, 2017
Ian Evans

While working on another project I ran into an issue running the Cloud/VMware modules for Ansible. No mater what I did it appeared broken. Newer module features required a newer version of Ansible. But I was being denied, stuck at 1.8 and no amount of apt foo seemed to resolve the issue.

Read Full Article

Is this how your organization embraced the cloud?

Aug 21, 2017
admin

What we generally see is that successful organizations approach transitioning to cloud purposefully, with a great deal of forethought and planning.

Read Full Article

Marchitecture!

Aug 06, 2017
admin

Marchitecture Noun A technology solution designed purely based on the information found in marketing slicks and Power Point presentations. Marchitecture can be created with no more than a high level understanding of the underlying technology and no attention need be paid to how the solution will actually solve a problem or achieve a desired outcome.

Read Full Article

Modern Disaster Recovery

Jul 17, 2017
Terry Murray

Over the last couple of years there have been huge advances in Disaster Recovery solutions. DR capabilities that are simpler and more cost effective are being built into platforms, included with Backup technologies or in many cases, come bundled with the applications themselves.

Read Full Article

From Storage and Backups to Data Management

Jun 20, 2017
Terry Murray

Outside of IT, "legacy" is usually a good thing. In sports, players and teams hope to build a legacy of winning, of making big plays in the clutch! But in IT, calling something legacy makes it sound old and crusty, like it might smell of arthritis cream.

Read Full Article

Protecting Digital Assets: A Data Center Architect’s Perspective

Jun 13, 2017
Justin Richards

There are many vectors to look at when protecting digital assets. The top concerns in my mind are backups, and security. I don’t think either are classified as sexy, but neglecting them tends to end poorly for your company, and possibly your career.

Read Full Article

Finding Joy in Backups!

Jun 05, 2017
Terry Murray

I’m still searching for that person that tells me they got into IT because they wanted to do backups. If you meet this person at a dinner party, get ready for a lively conversation! Nothing like discussing retention policies to get the party going!

Read Full Article

Thank You!

May 31, 2017
Terry Murray

First of all, we would like to thank all of our family, friends, clients and partners for supporting us in this new endeavor.

Read Full Article