<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

IT Solutions Blog

The Top 3 Workforce Multipliers for Boosting Cyber-Resiliency

Posted by John Wondolowski
Workforce multipliers can help pave the way to cyber-resiliency. They are adaptive capabilities that evolve with your business requirements and help you do more with less. These three workforce multipliers are particularly helpful in making businesses more resilient:

Read More

Attack Surface Management: Learning from a Real-world Cyber Attack

Posted by Jacob Haynes

In order to understand the magnitude of an organization's attack surface, let's walk through a real-life attack scenario and see how Attack Surface Management (ASM) could have protected the organization from getting hit with ransomware.

Read More

Attack Surface Management: Designing a Robust Program in Seven Steps

Posted by Jacob Haynes

Our goal as cyber-defenders is to look at our organizations from the cyber-attacker’s viewpoint, reduce the attack surface, and reduce the impact of a cyber-attack. Here are seven important steps to include in your Attack Surface Management program:


Read More

The Zero Trust Security Model

Posted by Jason Norred


Evolving your security model to align with the shifting landscape of business operations.

Read More

Avoiding Common Data Security Pitfalls

Posted by Jason Norred

Organizations can reduce risk and improve security posture by focusing security efforts on what matters the most, securing your data. 

Read More

The number one challenge for IT leaders adopting the cloud is security.

Posted by John Wondolowski

Data management is such a large and complicated practice area but there are a few fundamental protections that should be in place to help prevent emergencies.

Read More

4 Key Truths About Cybercrime. Discussion with former FBI Cyber Division Special Agent & Author Scott E. Augenbaum

Posted by Solutions II
Read More

Technical Debt | A Barrier to CyberSecurity Improvements

Posted by Jacob Haynes

Cybersecurity teams face many challenges when it comes to implementing the right mix of security controls to protect their organization from cyber-criminals, and Technical Debt is just one major barrier. Technical Debt, according to John Wondolowski, Solutions II CTO, "is the trade-off of short-term benefit…versus long-term value" and is "felt most strongly in the IT Operations and Infrastructure organization.” I would add that given the current landscape, technical debt is, at least, equally as felt on the Security side, if not more so.    

Read More

Announcement: Traci Easton as Sr. Director of Marketing

Posted by Solutions II

Newswire, LITTLETON, Colo., March 16, 2022 - Solutions-II, an award-winning Solution Provider specializing in Security, IT Managed Services, Hybrid Cloud, Data Management, Infrastructure, and Hybrid Maintenance solutions, announces the advancement of Traci Easton to Senior Director of Marketing. In this role, Easton will be responsible for leading marketing initiatives, digital marketing, corporate branding, and public relation communications with a focus on demand generation, thought leadership content, and enriching the client journey.

Read More

Technology Leaders Guide to Enabling AI in Casino Gaming

Posted by John Wondolowski

Enterprise Information Technology Leaders need to effectively operate today while planning to support a changing future. This has never been an easy job and over the past two years it has been significantly more difficult. But 2022 and beyond does not appear to be a time horizon where IT Leaders can catch their breath. In fact, new and future demands for technology capabilities across every area of Casino Gaming and Hospitality continue to accelerate. Perhaps the most daunting of these new and future demands will be the need to create a set of IT capabilities that can support the growth of Artificial Intelligence (AI) and Machine Learning applications (ML).

Read More