banner-why-daymark.jpg

Information Technology Navigator

Tips, Advice & Insights from Technology Pros

Takeaways from Cisco Live!™ 2018

I recently returned from this year’s Cisco Live! in Orlando. It was a busy week jam packed with great speakers, engaging sessions, demos and product announcements. There was so much going on at any given moment it was hard to get to every session of interest. Now that I’m back I’ve had some time to digest all I learned and thought I would share my key product takeaways for network security.

Read More
Tue, Jun 26, 2018
Share:    

Reboot Your Router Now! The Latest on VPNFilter

Do you have a Small Office Home Office (SOHO) grade router at home? Is it possible you have rogue devices on your corporate network? Does Supervisory Control and Data Acquisition (SCADA) traffic traverse your network? If you answer yes to any of these questions, then this post is a must read!

Read More
Wed, Jun 06, 2018
Share:    

Optimizing Firewall High Availability in Azure

 

Firewall capabilities fall short in cloud environments like Microsoft Azure due to the fact that Azure and other major public cloud providers offer limited access to their API’s. This creates a problem for enterprises as they look to security independent software vendors (ISVs) to enhance their security capabilities in the cloud the same way they would in the data center.

Read More
Tue, May 22, 2018
Share:    

Pending Initial Public Offering (IPO) Puts Security in the Spotlight

Becoming a publicly traded company has a profound impact on the way a business operates. The technology that is in place, and how it is deployed, can also come under close scrutiny. That was certainly the case for one of Daymark’s life science clients whose pending IPO put a spotlight on network security and data protection. In this blog, Steve Caprio, Daymark Cloud Consultant, answers some questions on the security journey of this enterprise.

Read More
Thu, Apr 26, 2018
Share:    

Pharmaceutical Company Upgrades Network to Meraki

Daymark consultants are on the front lines every day listening to our customers’ pain points and then architecting and deploying solutions to help solve some of their toughest IT challenges. They have amassed a wealth of knowledge from these real-world experiences and are happy to share them. Today we sat down with Matthew Mansell, Senior Network Consultant at Daymark, to talk about a recent networking project at a pharmaceutical company with 400 employees and a multi-building campus.

Read More
Tue, Mar 20, 2018
Share:    

Don’t Click that Link! Why Phishing Continues to Work

Cybercriminals continue to use phishing attacks on individuals within enterprises. With increased sophistication and multiple attack vectors, businesses must be vigilant at every step of the way to prevent infiltration. Let me share a recent example-

Today I received an email from a recruiter. It’s not out of the ordinary for recruiters to ping us with resumes hoping that we will see a fit for their candidate. This one was well written, had a company logo, and a picture of the sender. Including pictures is a growing trend with recruiters

Read More
Thu, Jul 06, 2017
Share:    

Make “Identity Utopia” a Reality in Active Directory

When making a decision to move production workloads to the cloud, one of the first things that is considered is cost. However, there are frequently many hidden costs that are not factored into the cloud decision until they appear in the real world. For instance, what is the cost to end users’ productivity if they don’t have the correct access to the application or system that now resides in the cloud? What new burdens are placed on the IT team if end users, now managing identities in two places, constantly require assistance to access their work? What costs are associated with securely authenticating end users to the workload?

Read More
Fri, Mar 24, 2017
Share:    

Moving Your Data to the Cloud? - 5 Tips to Ensure It’s Safe and Secure

Is that light you see at the end of the proverbial tunnel, or is it the headlight of an oncoming train?

The future of your professional career just might depend on your ability to successfully lead your company to the cloud. So many things to consider…


Yes, the cloud offers many advantages to your business including agility and high levels of fault tolerance, but in and of itself, the cloud does not release you from backing up your data in order to protect yourself from user error, data corruption, or data loss.


Just like provisioning new applications or scaling current applications, you need to consider every angle when protecting your data that lives in cloud.

Read More
Tue, Nov 11, 2014
Share:    

4 Cloud Strategies to Secure your Corporate Data

 
By now, many of you are probably aware of the most recent cloud breach where a large cache of celebrity nude photos was released on a forum board on 4chan. Though details are still emerging, the prevalent theory is that the hackers managed to gain access to the pictures by accessing the celebrity’s Apple iCloud accounts.
 
This is but the most recent security breach in a long string of security breaches, affecting major enterprises like; Sony, Twitter, Target, and even the Department of Homeland Security. It’s not your company data necessarily that these data thieves are interested in. Rather, it’s your contact data – the personal data you compile on each contact in your data base such as social security number, credit card number, and email address. This naturally raises the question; just how secure is your corporate data in the cloud? The hard truth is - “it depends”. Fact is, the only surefire way to guarantee your cloud data is 100% secure is to disconnect it from the cloud.
Read More
Mon, Sep 29, 2014
Share:    

The Importance of SOC 2 and SOC 3 Validation

By Bruce Hall, Director of Managed Services

Have you heard about SOC 2 and SOC 3 validation? If you’re storing data in the cloud (or considering it) it’s a business imperative. We’ve recently completed a Service Organization Control 2 (SOC 2) and Control 3 (SOC 3) validation process. While we’re proud of our achievement, it’s important to explain what this means for our customers. When researching an enterprise cloud or managed service solution, it’s essential to not only check for compliance with SOC 2 and SOC 3, but also to review the actual report. Prospective service providers should be more than willing to share their report. 

Read More
Fri, Mar 21, 2014
Share: