<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=585074&amp;fmt=gif">

OUR BLOG

Case Study: Bringing A Law Firm Into Cloud Computing

Posted by Keith Shaffer Dec 5, 2019 3:29:46 PM

Fairdinkum was challenged with helping a law firm client transition from their old IT infrastructure to modern cloud computing. In addition to helping set up the client’s cloud presence, Fairdinkum had to manage all the client’s devices. The client also needed to migrate their email system and files to the cloud. During this project, Fairdinkum was able to help the client fully onboard onto cloud computing and exploit the cloud’s bandwidth by facilitating collaboration and establish the client’s data infrastructure.

Read More

Topics: Cloud Computing, Case Study

Transitioning from Microsoft  Exchange Server 2010

Posted by Keith Shaffer Mar 28, 2019 3:15:10 PM

Microsoft Exchange 2010 is one of the most popular and utilized email and calendar servers amongst businesses. Since its release in 2010, it has had rapid international adoption and it has become an essential enterprise tool for sending emails and utilizing calendar servers to set up meetings and plan out business days. Although many companies have become accustomed to Exchange 2010 by now, it is coming to a screeching halt in less than a year. If your organization is not proactive about transitioning away from Exchange 2010 before 2020, the consequences can be extremely costly.

Read More

Topics: Cloud Computing, Outsourced IT Support, Server Migration

Do Managed Cloud Solutions Work for Nonprofits/Not-for-Profits?

Posted by Keith Shaffer Feb 15, 2019 2:11:29 PM

Cloud solutions have become the norm for both for-profit and nonprofit organizations alike. TechSoup found 90% of nonprofits surveyed have adopted some sort of cloud technology.

Read More

Topics: Cloud Computing, Cyber Security, Outsourced IT Support, Enterprise Mobility Management (EMM), Non Profit

Data Breach Scenario: Malicious Software - Financial Services Firms

Posted by Keith Shaffer Nov 13, 2018 4:00:11 PM

According to research from the Verizon RISK Team, few breaches are unique, meaning the vast majority of incidents are caused by a small number of scenarios. Verizon classifies 18 different data breach scenarios into four groups; the human element, conduit devices, configuration exploitation and malicious software. For the purposes of this article, we will focus on the malicious software that makes institutions vulnerable.

Read More

Topics: Cloud Computing, Cyber Security, Network Safety, Malicious Software, Data Breach

Data Breach Scenario: Malicious Software

Posted by Gabrielle D'Andrea Jun 19, 2018 10:04:57 AM

According to research from the Verizon RISK Team, few breaches are unique, meaning the vast majority of incidents are caused by a small number of scenarios. Verizon classifies 18 different data breach scenarios into four groups; the human element, conduit devices, configuration exploitation and malicious software. For the purposes of this article we will focus on the malicious software that makes organizations vulnerable.

Read More

Topics: Cloud Computing, Cyber Security, Network Safety, Malicious Software, Data Breach