<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

IT Solutions Blog

Solve the Problem of Cyber Asset Attack Surface Management

Posted by Solutions II

Solutions II, an award-winning Solution Provider specializing in Security, IT Managed Services, Hybrid Cloud, Data Management, Infrastructure, and Hybrid Maintenance solutions, is launching ASM (Attack Surface Management) Illuminate as a next-level service to protect your organization from a cyberattack.

Read More

Cyber Threats and Public Safety: Why Ransomware Can Be a Matter of Life or Death

Posted by Jason Norred

While businesses regularly deal with the operational disruptions and financial ramifications of cyber-attacks, it’s a different situation in the public sector, where state and local agencies hit by ransomware can quickly transform into a matter of public and personal safety.  

Read More

A Billion-Dollar Opportunity to Boost Your Cybersecurity Program

Posted by Jason Norred

The convergence of new funding sources, along with heightened cybersecurity compliance requirements at the federal level, is challenging state, local, and territorial (SLT) agencies to examine their cybersecurity landscape with a heightened level of scrutiny. For SLT agencies, there's never been a better—or more necessary—time to review current cybersecurity capabilities and identify gaps to address quickly and securely. Why? 

Read More

Recognized by ColoradoBiz Magazine as a Top 200 Private Owned Company

Posted by Solutions II

Solutions II is honored to be recognized by ColoradoBiz Magazine as one of the Top 200 Private Owned Companies in Colorado. Solutions II ranks #25, up from #39 in 2021 with growth of 58% over the past three years.

Read More

Don’t Let a “BOOM!” Take You by Surprise in 2023

Posted by Jason Norred

The “boom” is the breach, the attack, the thing data security nightmares are made of. Recently, the context for security breaches—or booms—has expanded to include those events that take place before and after an attack. In other words, breaches include the set of events that take place before an attacker penetrates your IT environment (or left of boom) and the response and recovery efforts that happen after an attack ensues (or right of boom.)

Read More

Five Takeaways from the Gartner IO Conference

Posted by John Wondolowski

After spending last week in Las Vegas at the Gartner Infrastructure Operations and Cloud Strategy Conference – here are our five takeaways for IT Leaders.

Read More

The Value of a Security Assessment Now

Posted by Jason Norred
A comprehensive security assessment considers the organization's business objectives and identifies security vulnerabilities that put those objectives at risk.

Read More

Solutions II Named a CRN Triple Crown Winner

Posted by Solutions II

CRN, a brand of The Channel Company, has named Solutions II a 2022 Triple Crown Award winner. The Triple Crown Award is reserved for those select few companies that earn a spot on all three of CRN’s prestigious solution provider award lists in the same calendar year. Now in its ninth year, the CRN Triple Crown Award spotlights top North American solution providers for displaying a tireless commitment to achieving high revenue, company growth, and unparalleled technical expertise within the IT channel.

Read More

Security in Everything

Posted by Solutions II

Security is a state of being. A mindset. A way of operating, working and managing relationships across your business ecosystem in meaningful and measurable ways. It’s an approach that keeps your employees safe, engaged, and productive— and your business operational. This is what we call Security in Everything.

Click here to download our new "Security in Everything" eBook!

Read More

Adopting a Secure Framework for Change in Casino Gaming

Posted by John Wondolowski

Technology leaders in gaming and leisure need to adopt a framework for incorporating new technologies while maintaining desired security risk profiles. Furthermore, they need to adopt/build in the most effective way to avoid unnecessary complexity and overhead.

Read More