Author Archives: Megan Carnes

6 top IT trends experts believe we’ll see in 2023

Meanwhile, there have been concerns around a skills shortage in IT. Rusty King, CTO of the European division of managed services company Thrive, said this has made companies eager to retain their existing IT staff.

King said this desire to retain staff is also linked to the ongoing cost-of-living and energy pricing crisis.

“Match this up with home or hybrid working practices in place from the pandemic and the introduction of a younger workforce with different desires and collaboration practices, we will see far more ingenious flexible working patterns and locations,” King said.

King added that this could lead to more professional services-as-a-service opportunities for managed service providers (MSPs), in order to provide “some stability in case of IT team losses”.

Employee Spotlight: John Padron, Solutions Architect

Welcome back to another installment of our “Thrive Spotlight” blog series.

Our featured Thrive employee is John Padron, Solutions Architect at Thrive. John works closely with the sales team on solving business issues for clients and prospects with Thrive’s deep NextGen technology portfolio.

Security has always been in John’s blood. He spent years as a police officer before entering the technology world. While at Thrive, he is a sought-out Information Security expert for top Florida law enforcement agencies.

John lives in Lakeland, Florida, and enjoys traveling, sampling new cuisine on the weekends and catching the latest Sci-Fi flick.

Hi John! Can you tell us about your background and how you came to Thrive?

I joined Thrive through the acquisition of DSM Technology Consultants in June 2022. I was with DSM for almost ten years, initially starting as a Systems Engineer on the Professional Services team and transitioned to Solution Architect at the end of 2018. Before DSM, I was a System Analyst and Criminal Justice Information Services (CJIS) Local Agency Security Officer (LASO) for the City of Key West and mainly focused on supporting the Police Department. I am also a former Police Officer, having served seven years with the city.

Where did you go to school or get training?

I attended the University of West Florida in Pensacola. I also interned with BellSouth while still in high school. Most of my training was on the job and through self-education. I earned several IT certifications in PC Support, Server Administration, Virtualization, Networking, Security and Cloud Computing.

What do you most enjoy about working for Thrive?

Although we are currently going through our integration with Thrive, the company provides a solid foundation with an encouraging environment for employees to learn, grow and succeed. Everyone has been so helpful and supportive at Thrive.

Any recent exciting projects at Thrive that you can tell us about?

I’m proud of a project we recently did with the Florida Department of Highway Safety. I assisted with the initial hardware deployment and set-up of the environment. It was rewarding to implement a solution that I helped design. We also recently worked on a significant Disaster Recovery project for a South Florida city. Our team performed a three-day DR assessment, and we designed, implemented, and strategized a comprehensive roadmap that will begin soon. City officials are thrilled with Thrive’s elegant technical solution that exceeded requirements while staying under budget!

Are you interested in learning more about Thrive? Click here!

And don’t forget to follow us on Twitter and LinkedIn for the latest news, and continue checking our blog for more in our “Thrive Employee Spotlight” series. Until next time…

 

On Platform and In Control

Today, security threats outnumber the resources available internally in most organizations to mitigate and manage them. While an array of security softwares exists to create layers of protection over various assets, attackers aim directly for the gaps in that mesh when trying to gain access to valuable data.

The notion is simple; organizations that lack sufficient data security are the most likely to be targeted and breached. Implementing intrusion detection systems (IDS) can increase awareness of the threats a business faces, but do the internal resources exist to quash that danger and prevent it from happening again?

DOWNLOAD our white paper today!

2023 threat predictions: Beware ‘economic uncertainty’ for the cybersecurity community

End-users are the top cybersecurity threat in 2023, says Chip Gibbons, CISO at Thrive:

Business Email Compromise (BEC) will continue to be a top attack method from cyberattackers and the easiest way into an organization. With the increase in zero-day attacks, people are going to be looking at reducing their externally available footprint. Multi-factor authentication (MFA) will be ubiquitous, and nothing should be externally available without it.

2023 Cybersecurity predictions – Part 1

Making cybersecurity predictions is easy (“Cybercriminals will become more inventive”). Making actionable ones for IT security leaders is much harder.

Ominous 2023 cybersecurity threats ensure an active landscape

“Business Email Compromise (BEC) will continue to be a top attack method from cyber attackers and the easiest way into an organization. With the increase in zero-day attacks, people are going to be looking at reducing their externally available footprint. Multi-Factor Authentication (MFA) will be ubiquitous, and nothing should be externally available without it,” explains Gibbons.

An accredited private school partnered with Thrive to enhance learning with updated IT technology and resources Download Now
CHALLENGE

The accredited, co-ed, private school for preschool through grade eight was operating on technology that was nearing end of lifecycle, including its firewalls, switches, servers and on-prem exchange. Since the internal IT director was leaving, the school wanted to implement an outsourced solution to provide updated technology to serve the school body of 80 faculty/staff and 360 students. To facilitate these changes, the school searched for an IT and Cybersecurity partner that was trusted and recommended and proven in the education space.

SOLUTION

Thrive was chosen over other vendors because of its NextGen technology solutions backed by an expert engineering team and 24×7 resources, along with glowing recommendations from other educational institutions. The Thrive team replaced the school’s outdated technology with NextGen solutions, including Managed EBMS Infrastructure (firewall/switching), Managed Backup and Managed Patching. Thrive also implemented Cloud adoption and collaboration with Managed ThriveCloud and Office 365. Thrive’s Cybersecurity Bundle, complete with Endpoint Security and Response, Secure DNS Gateway, Advanced Email Security, and Security Awareness Training was deployed to keep staff and student data secure.

RESULT

Thrive’s complete lift and shift from on-premise to ThriveCloud has been a learning process for school administrators. As a result of Thrive’s technology upgrades and managed services, the school can now work remotely while enhancing its overall security footprint. The structured process, onboarding procedures and internal end-user support from Thrive were instrumental in making school operations more efficient, secure, scalable and innovative. The entire IT infrastructure is now managed by Thrive, allowing school administrators to remain focused on their students.

How can Thrive help your business?

Thrive is a leading provider of outsourced IT Infrastructure designed to drive business outcomes by helping you get the most out of your IT.

To learn more about our services, CONTACT US

A start-up bank turned to Thrive to set up a secure, compliant and efficient digital banking IT infrastructure Download Now
CHALLENGE

A new company starting a digital bank lacked an IT infrastructure and needed an MSP provider that could get the company up and running quickly. The digital banking company required an MSP company with expertise in financial business applications and tools, such as FiServe, Ennacom and Q2, and proven success in building secure Microsoft Azure environments.

SOLUTION

The company selected Thrive because of its strong relationship with an existing partner, unmatched banking expertise and all-encompassing IT solutions. The Thrive onboarding teams quickly built out the Microsoft Azure infrastructure enabling the connections to Fiserv, Ennacom, and Q2. Thrive implemented its Thrive End User Cybersecurity Bundle, including, Endpoint Security and Response, Secure DNS Gateway, Advanced Email Security, and Security Awareness Training to protect end users from advanced threats, as well as the Thrive Security Incident and Event Management as a Service (SIEMaaS) with 24x7x365 Security Monitoring and Vulnerability Scanning and Management. Thrive also delivered a fully-managed Microsoft Azure infrastructure and Managed Office 365 with backups

RESULT

The biggest hurdle during this partnership was meeting the company’s tight deadlines. Thrive exceeded expectations to deliver a best-in-class IT infrastructure with Microsoft Azure, Cybersecurity and Office 365 management. Thrive’s NextGen technology solutions allowed this company’s digital banking operations to launch on time, safely and securely while meeting and monitoring stringent financial compliance regulations.

How can Thrive help your business?

Thrive is a leading provider of outsourced IT Infrastructure designed to drive business outcomes by helping you get the most out of your IT.

To learn more about our services, CONTACT US

How the cost of energy crisis trickles down to data centers as an end user

While data centers are not immune to rising costs, Rusty King, CTO of the European Division of Thrive, tells TechRadar Pro that they often provide greater energy efficiency, superior backup systems, and around-the-clock support, while sharing just how the energy crisis will affect businesses that manage their own infrastructure.

5 Top Data Management Predictions for 2023

Chip Gibbons, CISO at Thrive, cautions organizations to be more cognizant of where their data lives, no matter what industry they are in.

Financial institutions, law firms, health care providers, and other companies that deal with sensitive customer data should already understand that.

But even for those companies that aren’t typically managing lots of data, it’s crucial to know where your data lives and how to protect it, Gibbons said. Otherwise, the consequences could be grim.