IT Solutions Blog

The Value of a Security Assessment Now

Posted by Jason Norred
A comprehensive security assessment considers the organization's business objectives and identifies security vulnerabilities that put those objectives at risk.

Read More

Solutions II Named a CRN Triple Crown Winner

Posted by Solutions II

CRN, a brand of The Channel Company, has named Solutions II a 2022 Triple Crown Award winner. The Triple Crown Award is reserved for those select few companies that earn a spot on all three of CRN’s prestigious solution provider award lists in the same calendar year. Now in its ninth year, the CRN Triple Crown Award spotlights top North American solution providers for displaying a tireless commitment to achieving high revenue, company growth, and unparalleled technical expertise within the IT channel.

Read More

Security in Everything

Posted by Solutions II

Security is a state of being. A mindset. A way of operating, working and managing relationships across your business ecosystem in meaningful and measurable ways. It’s an approach that keeps your employees safe, engaged, and productive— and your business operational. This is what we call Security in Everything.

Click here to download our new "Security in Everything" eBook!

Read More

Adopting a Secure Framework for Change in Casino Gaming

Posted by John Wondolowski

Technology leaders in gaming and leisure need to adopt a framework for incorporating new technologies while maintaining desired security risk profiles. Furthermore, they need to adopt/build in the most effective way to avoid unnecessary complexity and overhead.

Read More

The 2022 State of IT Midyear Report

Posted by John Wondolowski

What are top IT executives thinking and planning this year and next year? How has their thinking changed over the last 12 months? Check out our "Solutions II 2022 The State of IT Mid-Year Report" for exclusive insights! Download the report here.

Read More

The Top 3 Workforce Multipliers for Boosting Cyber-Resiliency

Posted by John Wondolowski
Workforce multipliers can help pave the way to cyber-resiliency. They are adaptive capabilities that evolve with your business requirements and help you do more with less. These three workforce multipliers are particularly helpful in making businesses more resilient:

Read More

Attack Surface Management: Learning from a Real-world Cyber Attack

Posted by Jacob Haynes

In order to understand the magnitude of an organization's attack surface, let's walk through a real-life attack scenario and see how Attack Surface Management (ASM) could have protected the organization from getting hit with ransomware.

Read More

Attack Surface Management: Designing a Robust Program in Seven Steps

Posted by Jacob Haynes

Our goal as cyber-defenders is to look at our organizations from the cyber-attacker’s viewpoint, reduce the attack surface, and reduce the impact of a cyber-attack. Here are seven important steps to include in your Attack Surface Management program:


Read More

The Zero Trust Security Model

Posted by Jason Norred


Evolving your security model to align with the shifting landscape of business operations.

Read More

Avoiding Common Data Security Pitfalls

Posted by Jason Norred

Organizations can reduce risk and improve security posture by focusing security efforts on what matters the most, securing your data. 

Read More