Many organizations are realizing that sometimes their weakest link regarding cybersecurity is not found within their organization but in their supply chain or with their vendors. With their data not being within their organization it is hard to get visibility into the hygiene of the data. The great thing is there are Risk
Analytics/Analysis
Disaster/Recovery plans are never finished
By Gary Audin
You have adverse events that hamper or stop your IT and network operations. There are power outages, fires, floods, and security attacks. But you must also deal with interruptions due to new application installation, software upgrades that fail, data base changes,
Tech Tuesday: Multi-Factor Authentication
Multi-factor authentication (MFA) is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence to authenticate themselves. These authentication methods have
Data and Analytics in Today’s Pandemic
Frank Ohlhorst and Harry Brelsford revisit the analytics conversation. They tie the conversation to the current economic status and pandemic taking place. When you couple data and analytics you can come to the conclusion on where to drive your business helping to build big profits.
Microsoft Inspire Recap 2020
We met with IAMCP chapter president Danny Brown, to chat about Microsoft Inspire. Inspire is Microsoft’s worldwide partner conference. Typically, companies involved in Microsoft’s Partner Network travel from around the world to spend a week meeting with other partners, attending various sessions and keynotes led
Third Party Maintenance Business Strategies for MSPs (Part II)
Managed Services Providers (MSPs) are hyper focused on generating new sources of revenue to generate badly needed cash to survive the current economic correction. In part one of this series on Third Party Maintenance (TPM), we painted the
I Love Data
Phelim Rowe joins Harry Brelsford to explore privacy with Data. Phelim explores GDPR and the California privacy act and how it affects your data. He then goes onto to talk about why companies collect certain information