<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

IT Solutions Blog

Five Takeaways from the Gartner IO Conference

Posted by John Wondolowski

After spending last week in Las Vegas at the Gartner Infrastructure Operations and Cloud Strategy Conference – here are our five takeaways for IT Leaders.

Read More

Adopting a Secure Framework for Change in Casino Gaming

Posted by John Wondolowski

Technology leaders in gaming and leisure need to adopt a framework for incorporating new technologies while maintaining desired security risk profiles. Furthermore, they need to adopt/build in the most effective way to avoid unnecessary complexity and overhead.

Read More

Attack Surface Management: Designing a Robust Program in Seven Steps

Posted by Jacob Haynes

Our goal as cyber-defenders is to look at our organizations from the cyber-attacker’s viewpoint, reduce the attack surface, and reduce the impact of a cyber-attack. Here are seven important steps to include in your Attack Surface Management program:


Read More

Avoiding Common Data Security Pitfalls

Posted by Jason Norred

Organizations can reduce risk and improve security posture by focusing security efforts on what matters the most, securing your data. 

Read More

4 Key Truths About Cybercrime. Discussion with former FBI Cyber Division Special Agent & Author Scott E. Augenbaum

Posted by Solutions II
Read More

All Bets are Off in Cybersecurity

Posted by Jacob Haynes

The cybersecurity attack surface has grown exponentially over the last decade, and many organizations aren’t doing enough to prepare their teams to defend against cyber-attacks. The frequency and scope of these attacks have significantly increased across all industries, especially gaming. Why are casinos and gaming firms a prime target for cybercriminals? Because they are flush with cash and player data.

Read More

Internal Cloud vs External Cloud: The Pros & Cons of a New Cloud Infrastructure

Posted by Solutions II

The revolutionary aspect of cloud technology is that it separates hardware from software. This separation has spawned a multitude of new business capabilities and opportunities.

Read More

Advanced Data Center Solutions: Mitigating Cybersecurity & Disaster Threats

Posted by Solutions II

Adaptability is key for survival. As Charles Darwin noted, “It is not the strongest species that survive, nor the most intelligent, but the ones most responsive to change.

Read More

5 Effective Ways to Increase Data Security

Posted by Solutions II

Hackers show no signs of abating their attacks on businesses. The data that businesses generate is just too valuable for cybercriminals to ignore.

Read More

Insider vs. Outsider Data Security Threats: Are you taking risks?

Posted by Solutions II

Whether insiders or outsiders pose a greater threat to security is a matter of ongoing debate. According to Verizon’s 2018 Data Breach Investigations Report, 73% of cyberattacks were executed by outsiders and 28% of attacks involved insiders. 

Read More