When Should Your Company Think About Migrating to the Cloud?

There are multitude of reasons many companies are migrating to the cloud. Some are migrating to the cloud to aid in increasing the productivity of their IT staff, as well as the overall workforce. Others are looking to scale down data centers, hel… Continue reading When Should Your Company Think About Migrating to the Cloud?

Cloud Services for K-12 School Districts

Natural disasters such as hurricane’s, earthquakes, and fire can put a school district’s data out of reach. These are obvious reasons to have a solid disaster recovery strategy in place. In the aftermath of Superstorm Sandy that hit the Eas… Continue reading Cloud Services for K-12 School Districts

SSH vs VPN – What’s The Difference?

Going online has several risks, ranging from identity theft to theft of cash and other items. Some privacy is important as you surf the Internet. You have a choice of two technologies- VPN and SSH to help enhance some protection and privacy. These two … Continue reading SSH vs VPN – What’s The Difference?

Challenges of Enterprise Cloud Usage

Businesses report the key advantages of moving workloads to the Cloud are flexibility, agility, easy access to information, and cost savings. Clearly they are taking use of these advantages, as seen in the 2018 State of the Cloud Survey performed by Ri… Continue reading Challenges of Enterprise Cloud Usage

Protect Your Network with Wireless Security

Around the Millenium when 802.11 was ratified, any measure of security was enough; just having an SSID that was closed was “security”. Then came WEP to stop unauthorized access, however, that was soon cracked. That is why, the IEEE and the … Continue reading Protect Your Network with Wireless Security

Vulnerability Assessment versus Penetration Assessment

We get asked this question frequently, “What the difference between a vulnerability assessment and penetration assessment?”. It’s a great question and one we’d like to shed a bit more light on throughout this blog. Both engageme… Continue reading Vulnerability Assessment versus Penetration Assessment

What Businesses Should Know About GDPR

On Data Privacy Day earlier this year, CCSI briefly discussed the implications of The General Data Protection Regulation (GDPR). It is essentially a set of rules imposed by the European Union to give individuals primary control over their personal… Continue reading What Businesses Should Know About GDPR

CASB, what is it? Why do I need it? What has it done for me lately?

The first question most people have when they hear the acronym CASB is, “What the heck is this CASB thing?” According to Gartner, a cloud access security broker (CASB) is an on-premises or cloud-based security policy enforcement point that … Continue reading CASB, what is it? Why do I need it? What has it done for me lately?