<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

IT Solutions Blog

CRN Triple Crown Winner 2023

Posted by Solutions II

CRN, a brand of The Channel Company, has again named Solutions II a Triple Crown Award winner in back-to-back years. The Triple Crown Award is reserved for companies that earn a spot on all three of CRN’s prestigious solution provider award lists in the same calendar year. Now in its tenth year, the CRN Triple Crown Award spotlights top North American solution providers for displaying a tireless commitment to unparalleled technical expertise, company growth, and significant revenues within the IT channel.

Read More

Don’t Let a “BOOM!” Take You by Surprise in 2023

Posted by Jason Norred

The “boom” is the breach, the attack, the thing data security nightmares are made of. Recently, the context for security breaches—or booms—has expanded to include those events that take place before and after an attack. In other words, breaches include the set of events that take place before an attacker penetrates your IT environment (or left of boom) and the response and recovery efforts that happen after an attack ensues (or right of boom.)

Read More

The Value of a Security Assessment Now

Posted by Jason Norred
A comprehensive security assessment considers the organization's business objectives and identifies security vulnerabilities that put those objectives at risk.

Read More

Solutions II Named a CRN Triple Crown Winner

Posted by Solutions II

CRN, a brand of The Channel Company, has named Solutions II a 2022 Triple Crown Award winner. The Triple Crown Award is reserved for those select few companies that earn a spot on all three of CRN’s prestigious solution provider award lists in the same calendar year. Now in its ninth year, the CRN Triple Crown Award spotlights top North American solution providers for displaying a tireless commitment to achieving high revenue, company growth, and unparalleled technical expertise within the IT channel.

Read More

Security in Everything

Posted by Solutions II

Security is a state of being. A mindset. A way of operating, working and managing relationships across your business ecosystem in meaningful and measurable ways. It’s an approach that keeps your employees safe, engaged, and productive— and your business operational. This is what we call Security in Everything.

Click here to download our new "Security in Everything" eBook!

Read More

The Top 3 Workforce Multipliers for Boosting Cyber-Resiliency

Posted by John Wondolowski
Workforce multipliers can help pave the way to cyber-resiliency. They are adaptive capabilities that evolve with your business requirements and help you do more with less. These three workforce multipliers are particularly helpful in making businesses more resilient:

Read More

Attack Surface Management: Learning from a Real-world Cyber Attack

Posted by Jacob Haynes

In order to understand the magnitude of an organization's attack surface, let's walk through a real-life attack scenario and see how Attack Surface Management (ASM) could have protected the organization from getting hit with ransomware.

Read More

Avoiding Common Data Security Pitfalls

Posted by Jason Norred

Organizations can reduce risk and improve security posture by focusing security efforts on what matters the most, securing your data. 

Read More

The number one challenge for IT leaders adopting the cloud is security.

Posted by John Wondolowski

Data management is such a large and complicated practice area but there are a few fundamental protections that should be in place to help prevent emergencies.

Read More

5 Effective Ways to Increase Data Security

Posted by Solutions II

Hackers show no signs of abating their attacks on businesses. The data that businesses generate is just too valuable for cybercriminals to ignore.

Read More