Blog

THIRTY-EIGHT MINUTES OF PANIC

For thirty-eight minutes, citizens and visitors of the island of Oahu, HI lived in a state of panic. Emergency broadcast systems sent the following message to cell phones across the island: “BALLISTIC MISSILE THREAT INBOUND TO HAWAII. SEEK IMMEDIATE SHELTER. THIS IS NOT A DRILL.” Although it was determined that this message was sent in…
Read more

WHAT IS THE TRUE COST OF IT?

Hiring IT staff is a difficult endeavor that every organization experiences. It takes months to obtain headcount approval, interview candidates and create an offer letter with no guarantees you will hire the correct person. Reading resumes or hiring a recruiting company, training and retaining employees all take valuable time and money along the way. Then,…
Read more

WHAT YOU NEED TO KNOW ABOUT “SPECTRE” AND “MELTDOWN”

In recent days, you have most likely seen news stories about the "Meltdown" and "Spectre" vulnerabilities in many modern processors. Solutions II is aware of these issues, and we are watching the situation closely as we work with our partners to help you formulate the best plan of action to safeguard your infrastructure. According to the National…
Read more

THE IMPORTANCE OF PUBLIC SAFETY SOFTWARE BACKUPS

One experience that very few have had—in fact, it is likely that no one reading this blog has had it—is that of dialing 911 and having the call fail. And if you have had that experience, odds are it was a result of a faulty cell phone connection rather than a problem with the 911…
Read more

SOMETHING LOOKS PHISHY

Earlier this month, an investigation by the FBI’s Cyber Task Force in partnership with the Washtenaw County Sheriff’s Office and the Michigan State Police, led to Konrad Voits (27) guilty plea to damaging a protected computer within Washtenaw County government computer system. Voits’ motive focused on altering computer records of an inmate in an effort to…
Read more

TO CLICK OR NOT TO CLICK

Cyber Security firms are innovating at a pace never seen before trying to keep with various attack vectors facing organizations and individuals alike. It’s no secret that cyber security is a lucrative area to be in, but what is really driving this huge market and will it ever slow down? The speed and sophistication of…
Read more