<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

IT Solutions Blog

Five Takeaways from the Gartner IO Conference

Posted by John Wondolowski

After spending last week in Las Vegas at the Gartner Infrastructure Operations and Cloud Strategy Conference – here are our five takeaways for IT Leaders.

Read More

Attack Surface Management: Learning from a Real-world Cyber Attack

Posted by Jacob Haynes

In order to understand the magnitude of an organization's attack surface, let's walk through a real-life attack scenario and see how Attack Surface Management (ASM) could have protected the organization from getting hit with ransomware.

Read More

Attack Surface Management: Designing a Robust Program in Seven Steps

Posted by Jacob Haynes

Our goal as cyber-defenders is to look at our organizations from the cyber-attacker’s viewpoint, reduce the attack surface, and reduce the impact of a cyber-attack. Here are seven important steps to include in your Attack Surface Management program:


Read More

Social Media Vulnerability

Posted by Solutions II

As businesses embrace the digital information age and the diverse tool sets to engage with the community many have found these very tool sets can be a double edged sword with potentially devastating effects. Remember when HBO had sensitive information regarding one of its hottest shows Game of Thrones find its way onto Twitter?? Today businesses have to ensure that the channels with which they operate are as locked down as their data repositories are.

Read More

Thirty-Eight Minutes of Panic

Posted by Jeff Robbins

For thirty-eight minutes, citizens and visitors of the island of Oahu, HI lived in a state of panic. Emergency broadcast systems sent the following message to cell phones across the island: “BALLISTIC MISSILE THREAT INBOUND TO HAWAII. SEEK IMMEDIATE SHELTER. THIS IS NOT A DRILL.”

Read More

What You Need to Know About "Spectre" and "Meltdown"

Posted by Solutions II

In recent days, you have most likely seen news stories about the "Meltdown" and "Spectre" vulnerabilities in many modern processors. Solutions II is aware of these issues, and we are watching the situation closely as we work with our partners to help you formulate the best plan of action to safeguard your infrastructure.

Read More