<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

OUR BLOG

Gabrielle D'Andrea

Recent Posts By Gabrielle D'Andrea

Why Hiring a vCIO May Be Right for You

Posted by Gabrielle D'Andrea Jul 17, 2018 10:20:25 AM

Don’t have an onsite IT person? No problem!

Read More

Topics: Cyber Security, Outsourced IT Support

Budgeting Your Next IT Project

Posted by Gabrielle D'Andrea Jul 6, 2018 12:28:50 PM

Having trouble figuring out what steps you need to take in order to get your IT plans into action? You’re not alone, nor should you worry about what needs to get done when delving into such a complex venture. First and foremost, constructing a budget for your organization is your primary step and honestly, the hardest part. In order to do so, you must compile your company’s goals, values and IT objectives and determine if you will be updating your existing infrastructure and plans, or starting from scratch.

Read More

Topics: Outsourced IT Support, Server Migration

Understaffed? 5 Ways Outsourcing IT Can Help

Posted by Gabrielle D'Andrea Jul 3, 2018 10:44:30 AM

CIOs are challenged to balance the tactical 'keep the lights on’ activity with more strategic opportunities for digital transformation that predict the future success of the company. For example, while migration to the cloud promises overall cost savings for IT departments, there is a substantial outlay of resources at the stages for planning and implementation – when budgets are tight, and expertise is lacking, this is hard to achieve.

Read More

Topics: Cyber Security, Outsourced IT Support, Network Safety

Data Breach Scenario: BYOD

Posted by Gabrielle D'Andrea Jun 29, 2018 10:32:30 AM

Companies around the globe have identified the convenience of employees bringing their own device to work. In fact, 82% of companies allow the use of personal devices for work, but out of those companies, which support BYOD, 50% were breached through an employee’s personal device.

Read More

Topics: Cyber Security, Network Safety, Internet of Things (IoT), Malicious Software, Data Breach

Data Breach: Weak Configuration

Posted by Gabrielle D'Andrea Jun 26, 2018 11:34:24 AM

Weak Configuration: An Open Invitation for Cyber Exploitation

Technology devices don’t have a corner on weak configurations. System network configurations can be just as weak - especially when it comes to password protection.

Read More

Topics: Cyber Security, Security Training and Awareness, Network Safety, Malicious Software, Data Breach, Data Protection