IT executives and leaders are charged with building scalable, reliable, and secure environments. As more sensitive, regulated, and business-vital documents and transactions are digitized, even traditional businesses must embrace cybersecurity as a way of life. With this comes a mandate to develop and deploy a security program, which necessarily must include a component for continuous improvement. Security threats are constantly evolving, and threat or security fatigue can increase the pressure on security teams to keep up. Adding structure to the continuous improvement process can help relieve some of that pressure to “stay on top of everything” all the team.
I have discussions with clients all the time about technologies that we recommend that will help protect their companies from hackers. What most people do not understand is that technology itself will not protect a company. Someone who is attacking your company is using technology to try to get into your systems, but they are the brains behind the attack. If you put in a piece of equipment to stop the attack, but don’t have any “brains” that are orchestrating your defense, then you will fail. Technology can only take you so far.
Inc. magazine has revealed that Thrive is No. 3248th on its 37th annual Inc. 5000, the most prestigious ranking of the nation’s fastest-growing private companies. Thrive has jumped over 150 spots on the list since its last publication in 2017. Being recognized to the Inc. 5000 two years in a row is an extraordinary accomplishment as only 1 out of 3 companies make the list twice.
This three-part series will highlight areas that are easy for Thrive to implement to help keep your business protected from outside threats. If you missed Part One: Patch, Patch, Patch, we covered the importance of patching your environment to prevent potential disruption or even disaster. This installment, Part Two, will focus on advanced email security; how it developed and why you should ensure to use it in your businesses. Moving forward, Part Three will use this information and detail the proper measures to take when it comes to security awareness training.
Microsoft continues to gain market share with their core product set. This is mostly due to companies making the pilgrimage from on-premises Exchange to Exchange Online. The combination of Microsoft Exchange and Office licensing migrating to the cloud, the Microsoft rebirth in the cloud is exploding.
At the same time, many companies that have moved to Office365 may not have realized there are several features that MAY be included in their subscription which they could leverage. Unknown to many of you out there is this O365 resource, which provides a laundry list of included features. I recommend referring to this page to see which features Microsoft offers, that you can make use of.
When you start working with Logic apps, one of the things you’ll encounter is that there are hundreds of services presented as actions available to add easily to your integration workflows. Along with the numerous Azure services, there’s Dropbox, Slack, GitHub, Jira, Salesforce, and many, many more. As long as you have a license to access these services, and a way to authenticate, it is easy to begin interacting with them. However, what if you need to access an API that is not in the actions library? For instance, what if you have an on-premises application, or are connecting to a less-popular service such as openweathermap.org? Assuming the API is using REST, it would be possible to manually construct URLs and JSON documents and then use the HTTP actions in Azure to get, post, delete, etc. It is also possible, if your API has a correlating Swagger or OpenAPI document, to reference the document from an HTTP+Swagger action. However, Logic apps is not able to expose the returned data elements as easily consumable Dynamic content without further definition. Fortunately, there’s a relatively simple, more reusable way to add APIs, including those implementing SOAP, while also providing drag-and-drop access to the returned data elements. And you may be able to do it without writing any code, JSON, or other computer-readable syntax.
There’s an old adage in IT that goes something like this: “people only notice/value technology when it doesn’t work as expected.” This is never truer than with the databases that sit behind so many of the applications we use every day. We expect applications to perform as quickly as we’ve grown accustomed to. We also expect the information contained in them to be kept securely, accurately, and for as long as we need it. A substantial part of an application’s capability to satisfy these baseline requirements depends on the database. So, while most of us never interact directly with databases, most of us become acquainted with them when they become slow, or worse, lose data to theft or other disaster.
In today’s fast paced world, it’s social media, viral videos, celebrity news and the latest trends. Generally, these boil down to a single word or two which in and of itself, becomes Pop Culture. In the business of information technology, it’s all the acronyms and buzzwords. Some of these buzzwords end up sticking around and become much more than we could have imagined just a few years ago. One of them that’s stood the test of time is, “Cloud Integration.”
It’s become very clear in the past few years that the ever present, and often talked about, “Cloud”, is here to stay. Many people still don’t grasp how important the cloud has become, in both your business and your personal life. It’s more important than ever for businesses of all sizes to take a step back and assess the state of their Cloud Integration…it’s more than a trendy new buzzword now.
Today’s cybersecurity landscape is changing at a pace we’ve never seen before, and the ability for companies of all sizes to keep up is becoming increasingly difficult.
So that begs the question, and one that myself and my colleagues get very frequently, why would we outsource our security?
There are so many reasons why companies should very seriously consider enhancing what they’re doing internally by partnering with external experts, but I will lay out the Top 3 we’re seeing in the marketplace today.
Disaster Recovery Planning – Where to Start?
Whether you’re a newly hired IT leader or recently promoted, understanding the business continuity plan of the organization is critical to sleeping well at night and building a platform for future success. No matter the challenge or issue, the CIO is expected to prepare, test, and execute their way through any event involving IT systems, to keep the business going. As IT transitions from a necessary support system into an age of business enablement, having robust and tested DR capabilities are critical to allow for future scalability and reliability.
So, you’ve been charged with reviewing, revamping, or refreshing the “BCDR Plan”. Where do you start?