<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

IT Solutions Blog

The Dark Side of Digital Mourning: The AI-Generated Web of Deception

Posted by Solutions II

The digital landscape, with its potential for connection and remembrance, has a lurking shadow side. Cybercriminals have been exploiting online memorials by creating false obituary websites. This happens when a legitimate site has a really difficult to detect - counterfeit counterpart. 

Read More

CRN Triple Crown Winner 2023

Posted by Solutions II

CRN, a brand of The Channel Company, has again named Solutions II a Triple Crown Award winner in back-to-back years. The Triple Crown Award is reserved for companies that earn a spot on all three of CRN’s prestigious solution provider award lists in the same calendar year. Now in its tenth year, the CRN Triple Crown Award spotlights top North American solution providers for displaying a tireless commitment to unparalleled technical expertise, company growth, and significant revenues within the IT channel.

Read More

Most companies have hidden assets that are vulnerable to attack. We solved this.

Posted by Jason Norred

What is ASM Illuminate? Why you need it and how it works.

 

Read More

The New Frontier: Security Threats | Solutions II Security Experts Weigh In

Posted by Solutions II
As we approach mid-year 2023, technology continues to advance at an unprecedented rate, bringing myriad opportunities for businesses and organizations to excel in their respective industries. However, such rapid advancements have also exposed us to a new set of challenges, one of which is cybersecurity.

Read More

CJIS Compliance & Audits in Public Safety

Posted by Jeff Robbins

Adhering to stringent cybersecurity standards is not only a good first-line defense against cyber-attacks, but it’s also a requirement for government agencies.

Read More

Solve the Problem of Cyber Asset Attack Surface Management

Posted by Solutions II

Solutions II, an award-winning Solution Provider specializing in Security, IT Managed Services, Hybrid Cloud, Data Management, Infrastructure, and Hybrid Maintenance solutions, is launching ASM (Attack Surface Management) Illuminate as a next-level service to protect your organization from a cyberattack.

Read More

Cyber Threats and Public Safety: Why Ransomware Can Be a Matter of Life or Death

Posted by Jason Norred

While businesses regularly deal with the operational disruptions and financial ramifications of cyber-attacks, it’s a different situation in the public sector, where state and local agencies hit by ransomware can quickly transform into a matter of public and personal safety.  

Read More

A Billion-Dollar Opportunity to Boost Your Cybersecurity Program

Posted by Jason Norred

The convergence of new funding sources, along with heightened cybersecurity compliance requirements at the federal level, is challenging state, local, and territorial (SLT) agencies to examine their cybersecurity landscape with a heightened level of scrutiny. For SLT agencies, there's never been a better—or more necessary—time to review current cybersecurity capabilities and identify gaps to address quickly and securely. Why? 

Read More

Don’t Let a “BOOM!” Take You by Surprise in 2023

Posted by Jason Norred

The “boom” is the breach, the attack, the thing data security nightmares are made of. Recently, the context for security breaches—or booms—has expanded to include those events that take place before and after an attack. In other words, breaches include the set of events that take place before an attacker penetrates your IT environment (or left of boom) and the response and recovery efforts that happen after an attack ensues (or right of boom.)

Read More

Five Takeaways from the Gartner IO Conference

Posted by John Wondolowski

After spending last week in Las Vegas at the Gartner Infrastructure Operations and Cloud Strategy Conference – here are our five takeaways for IT Leaders.

Read More