Organizations must discard the old model of ‘trust but verify’ which relied on well-defined boundaries. The new model of “Zero Trust” mandates a ‘never trust, always verify, enforce least privilege” approach from inside and outside the network.
Technical Debt is a concept that we've heard a lot about. It conceptualizes the trade-off between the short-term benefit of rapid delivery versus long-term value. Once a company makes the trade-off for rapid delivery without fully weighing the longer-term implications, they create a level of technical debt that will need to be serviced. Much like…Read more
Solutions II, an award-winning IT Services and IT Solutions Provider specializing in Managed Services, Cyber-Security and Data Center solutions, announces the acquisition of Chouinard & Myhre, Inc.
Several of our clients run Red Hat Linux Operating Systems. So, when reading this headline about a cloud security company which was just purchased by Red Hat for a cool $250 million, I thought I’d report on why this is kind of a big deal. If you were just about to stop reading, allow me…Read more
As businesses embrace the digital information age and the diverse tool sets to engage with the community many have found these very tool sets can be a double edged sword with potentially devastating effects. Remember when HBO had sensitive information regarding one of its hottest shows Game of Thrones find its way onto Twitter?? Today businesses have…Read more
It’s a truism that educating employees is one of the most important steps to preventing security breaches in the workplace. In fact, one survey found that two thirds of the professionals charged with data protection and privacy training point to employees as the largest source of failure in corporate IT security measures. Surprisingly, though, businesses are not…Read more