Peter Zeller

      Recent Posts

      5 Cloud Technology Trends in 2020

      Posted by Peter Zeller on Dec 10, 2019 8:00:00 AM

      Top 5 Technology Trends of 2020 Thin

      Every year there is a new list of trending IT solutions that improve efficiencies and processes. IT professionals, in order to keep their organizations lean and agile, will look to this upcoming years' latest technologies and trends. With pressure to cut costs and improve processes, 2019's technologies can help CIOs, CTOs, and CISOs achieve this. Investing in cloud solutions and services will help organizations increase productivity, efficiency, and beat out competition. Here are the top 5 solutions your company should implement in 2019:

      Read More

      Topics: Hosted PBX, SD-WAN, Disaster Recovery, Backup, SECaaS, Desktop as a Service

      4 Steps to Proactively Protect Your Business from a Phishing Attack

      Posted by Peter Zeller on Nov 21, 2019 3:50:21 PM

      You may remember in the past receiving obnoxious, in-your-face emails with formatting that was horrible, grammar that was even worse, and hyperlinks that seemed… fishy. Just by seeing the title or viewing the preview, you could tell something wasn’t quite right, so you promptly deleted it. Good for you, you just avoided a phishing attack.

      Read More

      Topics: Cyber Threats, Email Security

      Cloud VS On Premises: The Disaster Recovery Battle

      Posted by Peter Zeller on Nov 8, 2019 11:30:00 AM

      Making decisions about business continuity (BC) and disaster recovery (DR) can be a CIO’s worst nightmare. Planning, implementing and testing a strategy can take months and sleepless nights. Additionally, some CIOs face the added struggle of small budgets, fewer resources, and a mandate for agility to remain competitive. Add them all up, and you get an extremely difficult task.

      But taking on the difficult task is far better than waking up one morning to discover a disaster has struck and you were unprepared. 

      Read More

      Topics: Risk Assessment, Business Continuity, Disaster Recovery

      What is a Man-in-the-Middle Attack?

      Posted by Peter Zeller on Oct 29, 2019 8:00:00 AM

      With the many, many different types of cyberattacks out there, it is easy to forget about or be unaware of the lesser known ways that your data could become compromised. Being unaware and uninformed about types attacks can leave you vulnerable to that exact attack. Researching the different types of network attacks has the potential to save your business from ransomware and other serious breaches. 

      Read More

      Topics: Cloud Security, Cyber Threats

      How to Save your Business from an IT Security Shortage

      Posted by Peter Zeller on Oct 24, 2019 7:45:00 AM

      Technology is a constantly changing industry. That is one of the things that makes a career in tech so exciting and appealing. It’s one of the things that keeps employees coming through the doors from 9-to-5, Monday to Friday. In fact, jobs in the tech industry and information technology are predicted to grow by around 12% from 2018 to 2028 with Information Security jobs increasing by 32% overall. This is obviously much faster than most other industries.

      Read More

      Topics: Cloud Computing, Cybersecurity

      How to Set Up a Government-Compliant Data Backup Plan

      Posted by Peter Zeller on Oct 23, 2019 7:30:00 AM

      Did you know that, outside of the US government, the healthcare industry holds more personal data about the general public than any other business entity?

      Everything from Social Security numbers to medical records to payment details are held by healthcare providers. If the information stored by these businesses were hacked, it would jeopardize the integrity of the healthcare industry and the livelihood of millions of Americans. As cyberattacks rise in the healthcare industry, this risk has become even greater.

      Read More

      Topics: Compliance, Compliant backup, Backup

      How to Train Your Employees to Recognize Cyberattacks

      Posted by Peter Zeller on Oct 22, 2019 10:49:16 AM

      Over the past several years, there has been a significant rise in the number as well as the severity of cyberattacks that have taken place. As businesses increasingly conduct their transactions online, cybercriminals, as well as other malicious actors accordingly, invest their time and resources to compromise business networks and access private data for their nefarious purposes. So far this year, data breaches and cyberattacks have cost businesses an average of $3.92 million; this is a 1.5 percent increase from 2018 and a 12 percent increase from 2014 when the cost of a data breach was approximately $3.5 million.

      Read More

      Topics: Cloud Computing, Intrusion Detection and Prevention

      The Do's and Don'ts of Password Creation and Security

      Posted by Peter Zeller on Aug 9, 2019 9:41:42 AM

      There you are, on a deadline, frantically working against the clock.

      Read More

      Topics: SECaaS, Human Error, Cloud Security, Password Best Practices

      The Top 5 Disaster Recovery Myths

      Posted by Peter Zeller on Aug 5, 2019 12:58:00 PM

      The world is a dangerous place, and it’s even more dangerous for your data. How can you be sure that your company’s data will be safe if a disaster strikes, and that your Disaster Recovery (DR) plan will prove effective? There are a lot of misconceptions surrounding the importance and the effectiveness of DR plans and services.

      Read More

      Topics: Disaster Recovery

      As a Service: The Top 6 Cloud Services Your Business Should Be Using

      Posted by Peter Zeller on Jul 18, 2019 9:00:00 AM

      The Tech Industry is growing at a break neck pace and shows no sign of stopping. New waves of innovation keep hitting the market, and  IT and Software Development jobs are growing at 2x the rate of national job growth.

      Read More

      Topics: Disaster Recovery, Backup, SECaaS, Desktop as a Service