Thrive is currently ranked among the top 100 IT Managed Service Providers globally. Our Mission is to become the most respected and referred technology solutions firm serving mid-market, enterprise, and emerging customers in the Northeast United States.

1-866-205-2810

info@thrivenetworks.com

25 Forbes Boulevard, Suite 3 Foxborough, MA 02035

Top
 

Disaster Recovery

Cloud Infrastructure is Inherently Redundant, is Your Server Room?

cloudAs we enter winter each year, it is an appropriate time to review what you will do under disaster type circumstances.  There are many things to consider when putting together a disaster plan, but one of the most basic IT requirements is power. Without power very few things can happen these days.  The reality is that your power will most likely go off at some point during the year for something other than being affected by a nor’easter.  If you were to be without power for seven to ten days because of fire at a power substation would that impact your business?  What about no power for 24 hours during your high season after a car strikes a telephone pole?  What if lightning struck your building and took out your main power panel?

Test Your Cybersecurity Readiness

It was 2:30am one weekday night when my smoke alarms started going off at home. They are all connected together, so the whole house was a nice alarm bell. It was a weird fall night when it was warm outside and very foggy. We have had a lot of work done in the house, and I assumed it was a malfunction because of the dust that had been kicked up and the humidity outside. I disconnected the alarm that started this noise and got the family back into bed. 

Preemptive Measures to Protect Your Company’s Database Against Disaster

UpdateThere’s an old adage in IT that goes something like this: “people only notice/value technology when it doesn’t work as expected.” This is never truer than with the databases that sit behind so many of the applications we use every day. We expect applications to perform as quickly as we’ve grown accustomed to. We also expect the information contained in them to be kept securely, accurately, and for as long as we need it. A substantial part of an application’s capability to satisfy these baseline requirements depends on the database. So, while most of us never interact directly with databases, most of us become acquainted with them when they become slow, or worse, lose data to theft or other disaster.

Disaster Recovery – Datacenters, the Cloud, and Winning Over the Business

CybeRTODisaster Recovery Planning – Where to Start?

Whether you’re a newly hired IT leader or recently promoted, understanding the business continuity plan of the organization is critical to sleeping well at night and building a platform for future success.  No matter the challenge or issue, the CIO is expected to prepare, test, and execute their way through any event involving IT systems, to keep the business going.  As IT transitions from a necessary support system into an age of business enablement, having robust and tested DR capabilities are critical to allow for future scalability and reliability.

So, you’ve been charged with reviewing, revamping, or refreshing the “BCDR Plan”.  Where do you start?

Cloud Infrastructure is Inherently Redundant, is Your Server Room?

cloudAs we enter the US hurricane season each year, it is an appropriate time to review what you will do under disaster type circumstances.  There are many things to consider when putting together a disaster plan, but one of the most basic IT requirements is power. Without power very few things can happen these days.  The reality is that your power will most likely go off at some point during the year for something other than being affected by a hurricane.  If you were to be without power for seven to ten days because of fire at a power substation would that impact your business?  What about no power for 24 hours during your high season after a car strikes a telephone pole?  What if lightning struck your building and took out your main power panel?

5 Key Steps for Implementing a Business Continuity Plan

The major disasters this past year made people aware of a lot of things including the manner in which businesses assess risk and devise plans to deliver critical services in the event of a disruption. Although catastrophic events have a minimal probability, the businesses that plan carefully for business continuity are the ones that stand the best chance of continuing their services in the event of a disaster.

What is your Security Plan? (Part 3 of 4)

When’s the last time you took a step back and took an honest look at what you and your organization were doing to address IT security? In the first of this four-part series we highlighted a few things you should be concentrating on regarding email security and training your end users to know what is and what is not a phishing attempt while also keeping your machines fully patched.  In the second part of the series we focused on Next Generation Firewall’s (NGFW), Web Application Firewalls(WAF), and Denial of Service(DoS).  In this third part we will focus on Advanced Endpoint Protection.

Implementing a Business Continuity Plan

Disaster RecoveryThe major disasters this past year made people aware of a lot of things including the manner in which businesses assess risk and devise plans to deliver critical services in the event of a disruption. Although catastrophic events have a minimal probability, the businesses that plan carefully for business continuity are the ones that stand the best chance of continuing their services in the event of a disaster.

It does not take a monumental catastrophe to disrupt daily operations of a business. Sometimes it can be something as simple as a power outage or intermediate interruptions that result from a storm or an attack instigated by cybercriminals.

Having a business continuity plan in place means arranging to continue to deliver services which are the most critical to business operations and identifying the resources which are needed to support business continuity. In order for a business continuity plan to be effective, there are key critical components that must be present during the planning process.

What is your Security Plan? (Part 2 of 4)

When’s the last time you took a step back and took an honest look at what you and your organization were doing to address IT security?  In the first of this four-part series we discussed a few things you should be concentrating on regarding email security and training your end users to know what is and what is not a phishing attempt, while also keeping your machines fully patched.  In the second part of the series we will focus on Next Generation Firewalls (NGFW), Web Application Firewalls (WAF), and Denial of Service (DoS).

The firewall(s) in your environment(s) are the first line of defense. What does this mean?

 

How low are you willing to CybeRTO and CybeRPO? Part 3 of 3

 

Data RecoveryIn the first part of this series, we discussed CybeRTO (Sigh-Ber-To) and CybeRPO (Sigh-Ber-Po) and the general meanings of both.  In the second part of the series, we took a deeper look at the two different ways to address the particular aspects of CybeRTO.  In the third and final part of this series we’re going discuss CybeRPO, and identifying the point in time you’ll be recovering from in the event of data loss from a cyber attack. Another way to look at it is, how much data will I lose after a cyber attack has occurred?