We’ve been dialing 911 for emergencies since 1968. So 911 calling wouldn’t appear to be a hot topic among business and technology professionals today.Read More
The AWS Well-Architected Framework is used by Cloud Architects to plan, migrate, transform, and operate their workloads on AWS. Migrating your applications and servers from Data Centers into the AWS Cloud requires a specific approach and is different for all clients. But thanks to the AWS Well-Architected Framework, here at ConvergeOne we have the necessary tools and knowledge to access your applications/servers’ environments and design solutions that use the Five Pillars of the AWS Well-Architected Framework. These five pillars should not only be used for cloud migrations. They are crucial points of consideration when designing in the cloud, applications, and even physical Data Centers. Below is a break down of the five pillars and some of the key important points to consider when migrating to the AWS Cloud:Read More
I can remember the moment clearly: I was in an early-morning meeting with several of my employees. Several minutes into the meeting, my mobile phone came to life with notifications and a call. Shortly after answering, there was a knock at the door. Almost instantly, I did not feel so well; I knew this couldn’t be good. As if it were rehearsed for stereo effect, I heard the words no one ever wants to hear: “I think we’ve been hacked.” My first response was, “Not possible!” Turns out, it was very possible and very much a reality. To be fully transparent, I thought my life and professional career were over in that moment; 25 years down the drain just like that! I took the cyberattack very personal.
As an Executive Director at one of the largest school districts in my state, I had officially become the next victim of ransomware.Read More
For years, we have used MPLS and, more recently, SD-WAN to ensure a quality network experience for our office site users. I've noticed a lot of clients still keep their MPLS carrier service, but at a reduced bandwidth with SD-WAN overlays. This works great to deliver apps and services from centralized or regional network hubs.Read More
Since the shift from the concept of traditional IT to the public cloud, there have been many new security services and cloud-native tools being implemented across all vertical industries to protect and govern the customer cloud environment. Cloud computing is evolving at an ever-increasing rate of change, but regulations and technology have not been keeping the same pace. Businesses trust the AWS cloud to secure their infrastructure so they can grow and evolve by accelerating innovation.Read More
The continuing evolution of ransomware attacks requires innovative, protective solutions. Dell has led the protection of the data center with the Cyber Recovery solution, which is the only solution certified by Sheltered Harbor. It implements a digital air-gap solution that provides a dedicated replica isolated from the production environment. The isolation limits risks associated with remote threats identifying, accessing, and corrupting the backup data. In order to identify when a ransomware attack has occurred, Dell has partnered with Index Engines to monitor the backup data stream. CyberSense from Index Engines uses machine learning to identify changes in the backup data and alert when the appearance of an attack occurs.
It’s no mystery that airports will undergo major renovations in the coming years. But those airports must also embrace digital transformations of critical airport infrastructure from legacy networks to state-of-the-art technology that’s future-proof, secure, and reliable.Read More
Just ask your Customer Service Representatives, "What is the toughest or most annoying part of your daily tasks?" The answer may not surprise you. You may find that your workforce is spending a large amount of time on things that are necessary, but repetitive. Frankly, these items do not add significant value to the business and, in turn, they diminish employee satisfaction. Robotic Process Automation (RPA) is built to handle tasks that are slowing down your employees, as well as ones that are just very boring for them to do. A trusted partner can help you figure out where automation can add to the efficiency and effectiveness of your Contact Center or Back Office.Read More
Microsoft has issued an Exchange Server Security Update on April 13, 2021 for companies with an on-premises deployment of Microsoft Exchange Server 2013, 2016 and 2019. This affects both on-premises and hybrid deployments of Exchange Online. Exchange Hybrid users are less affected. However, the FBI’s recommendation is to patch this vulnerability as soon as possible.Read More
Recently, I was asked to speak about Public Cloud Services, and specifically, CPaaS (Communication Platform as a Service) during a training call. It was actually really good timing, because this has been a hot topic with vendors, partners, and customers. In those discussions, I find that there’s a lot of misconceptions about what CPaaS actually is. As mentioned, CPaaS stands for Communication Platform as a Service, but even that term can mislead you into thinking that it’s a much broader and more inclusive thing than it actually is.Read More