By Kevin Vogl, VP Virtualization & Cloud
One of the hottest topics with our clients is how to use the Cloud and what solutions best fit the Cloud model. Two of them are Backup and DR. And the reasons are clear. The top reason being you
Endpoint security isn’t just about detecting bad apples, it’s about getting rid of them for good.
Cyber security is incredibly important in today’s digitally connected marketplace. One of the primary ways that organizations protect their critical data is through a variety of endpoint security measures. The
Keep track of all the latest IBM BigFix patches that were released in June 2017.
When it comes to endpoint security, organizations offering security solutions must be constantly on the lookout for new threats and vulnerabilities. One of the largest players in the endpoint security arena
Are your POS systems protected with effective endpoint security measures?
A number of high profile data breaches have been hitting the news as of late. One such attack occurred at Chipotle restaurants around the country, adding to Chipotle’s PR nightmares that started with food quality issues
Although much of the tech world is still reeling from May's devastating WannaCry Ransomware Attack, another one struck Europe on Wednesday. The original attack was a quickly spreading virus attack which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom
Why Endpoint Security Management is So Important for Today’s Growing Enterprises.
With employees having access to a variety of devices both in the office as well as when they’re working remotely, security is often a real challenge. As more organizations begin to utilize BYOD (Bring Your
Don’t fall victim to a serious cyber attack. Champion Solutions Group can help bolster your current endpoint security platform.
Today, security teams can quickly become overwhelmed by the wide array of vulnerabilities that present themselves from all sorts of areas. Organizations typically have a variety of
By: Phil Hamrick
I recently visited the IBM Analytics Development Center in Ottawa to review the IBM Analytics technical roadmap. IBM has made great strides with their cloud-based analytics platform, Watson Analytics, and have been extremely focused on end user, ease-of-use features.
If you aren’t too familiar
Here is some helpful information for you and your team about the ‘WannaCry’ ransomware attack that occurred over the weekend. Hundreds of thousands of machines globally were infected in a short period of time. Many of our customers are asking what they can do now
By Kevin Vogl, VP of Virtualization & Cloud
Veeam is a key component to many organization’s data management strategy for their virtualized environments. They rely on Veeam to backup all of their virtual machines w/out having to take them down or install agents on individual applications.
Microsoft announced that it was scrapping its February Patch Tuesday security patch release, causing ripples throughout the IT world. The most concerning aspect around this is that many of the vulnerabilities these patches were going to resolve are being actively exploited. This places businesses in
The U.S. Food and Drug Administration (FDA) recently presented guidance for healthcare to address cyber security vulnerabilities in medical devices, including both stand-alone and IoT devices types. The intentions of the FDA’s recommendations are to serve as a non-binding framework around which healthcare organizations can