Sign Up for Our Blog
A Brief Explanation of Encryption and Why it Matters in the Cloud Age
Encryption has become so ubiquitous that one could assume that most people understand what it is, how it is used, and why it is important in the digital age. Of course, we all know what…View Now
Automation is Everywhere!
As you navigate everyday life, have you taken a moment to stop and think of how many things are automated. Almost every stoplight you pull up to has a sensor that ensures that the system…View Now
Operating Systems & Patch Management — Windows-as-a-Service
On July 29th, it will be 5 years since the release of Windows 10. Seems like just yesterday that Microsoft released their bundle of joy into the marketplace. They grow up so fast, don’t they?…View Now
Security Driven SD-WAN: A Key Factor in Network Modernization
With many of us working from home during COVID-19, one unexpected benefit remote workers may be experiencing is better performance and faster response times to the business applications that are used daily to perform our…View Now
Enabling Remote Workforce and Business Operations to be Scalable During COVID-19 and Beyond.
As businesses and organizations around the world were forced to move their employees to work remotely, many were not truly prepared for what is required to make that transition while maintaining seamless operations. As a…View Now
Cloud First with COVID-19 – The right business strategy
Like many of you, I have had some time in recent weeks to reflect on my role and how we as a NextGen managed services and security provider are helping during this pandemic. Much of…View Now
Trusted Advisors – Beyond Service Understanding and into Deal Positioning
As 2019 ended and 2020 began, the nationwide Channel continued its tremendous growth. Partners are more established than ever in their roles as trusted advisors and are increasingly adept at uncovering cyber security, Cloud, and a…View Now
Phish Out of Water — Remote Workers Email Security
The last few weeks have been a big change for everyone. Many people are working from home, and some of those people have children at home with them. Right now, my kids are wandering the…View Now
Still not using 2FA/MFA? No time like the present to make the change!
Has your remote work policy changed in the last month or two? Are more of your employees working from home or at locations that are “untrusted”? The answer is almost certainly a resounding YES! Now…View Now
The Single Cause Behind Most Vulnerabilities and How to Solve It
Having been involved in hundreds of vulnerability assessments I can confidently say that most issues have a single underlying source. The discovered vulnerability could be an increased risk of ransomware exposure, buffer overflows, elevation of…View Now