secure data

Keeping Customer Data Secure in the Cloud: 5 Things to Know

Cloud computing has drastically changed how people store and access data. For example, employees can access the information required to do their work from anywhere, even while on the road.

However, you’re probably keeping customer data in the cloud, too. If so, you have an additional obligation to protect that information. Here are five things to know when accomplishing that:

hybrid cloud

The Three Best Practices for Securing the Hybrid Cloud

When it comes to cloud infrastructure and implementation, the hybrid cloud option is one that many companies are beginning to latch on to. Overall the most notable element of this realm of security is that it combines the flexibility and customization of a private cloud with the availability of the public cloud. This approach tends to be significantly more cost-effective and offers a wide array of features.

cloud computing

Cloud, a Year in Review and Looking Forward

In 2019, cloud computing truly became mainstream, more than ever and the trend is here to stay.

As more and more businesses from all industries rush to migrate to the cloud and build cloud-based applications, Gartner predicts that the public cloud services market will grow 17% next year, from US$ 227.8 billion in 2019 to an estimated US$ 266.4 by the end of 2020. And a recent Forrester report estimates that the market will grow to a total of US$ 411 billion by 2022.

MSP Voice Episode 71 – “Longevity as a Startup” with Larry Bianculli

This week’s guest is Larry Bianculli, managing director, with CCSI who provide MSP and MSSP services in the New York City/Long Island area. CCSI (which stands for Contemporary Computers Services) has been around since 1974. CCSI has always been focused on services, the founders coming from IBM. CCSI has a range of customers from SMB to fortune 500. They have customers around the US as well as overseas.

Larry has been with CCSI for 4 years and is focused on growing the enterprise and commercial business. Prior to CCSI Larry spent over 15 years working for vendors (both big and small). For their large customers, CCSI helps to augment their IT staff in specialized areas. They’ve seen some great opportunities with co-managed SIEM. CCSI focuses mostly on financial, healthcare, insurance and manufacturing.

Listen to the full episode for more information on how CCSI has been so successful over the years by essentially thinking of themselves as a startup.

Time Series Databases, the Future of Monitoring and Logging

Long gone are the times where “the” database was single Relational Database Management System installed typically on the most powerful server in the datacenter. The monsters handled anything the business required. Today databases run on commodity hardware, they are also more sophisticated in terms of the high availability and specialized to handle particular types of data. Specialization allows them to achieve much better performance – everything is optimized to deal with a particular kind of data: optimizer, storage engine, even language doesn’t have to be SQL, like it used to be in the past. It can be SQL-based with some extensions allowing for more efficient data manipulation, or it can be something totally new.

cloud security

It’s in the Cloud, So it Secure . . . Maybe!

Since the introduction of cloud computing, more and more companies have been flocking to cloud computing, because it has proven to be cost effective and inherently more secure than on premise data centers. However, no one has ever claimed that making switch magically happens by pressing a button. Cloud computing needs to be properly managed and configured. Processes and policies that protect the data and applications that reside in the cloud need to be developed and continuously monitored to stay within best practices.

IoT Security

IoT Security or the Lack There Of

The Internet of Things (IoT) is poised to become the biggest technological breakthrough of this decade. Many households will soon own a smart car, smart refrigerator, and smart thermostat. In the business world IoT is also here and is steadily gaining additional profile and credibility. With that comes a vastly complex IoT ecosystem. 51% of surveyed IT and business decision makers report that their organization uses IoT devices that have been created by a third-party.

cloud security mistakes

Drastic Cloud Security Mistakes No One Should Make

In our modern age, it is natural to want to modernize your business in order to keep up with the times and keep customers interested, so investing in the cloud can often seem like a natural pathway for changing businesses, but it does come with some risks. Not paying attention to the very real risks of compromising cloud security – which can seem like a faraway, non-important issue – can cost you greatly, and, at worst, could ruin your business. Customers put their trust in you to keep them and their data safe, so compromising that can be the absolute faux par, which will destroy your business’ reputation and ensure that no future success can be enjoyed. But enough with the fear-mongering: how can you stop these security slips ever happening in the first place? Knowledge is your best tool, so knowing about the dangers often prevents them from becoming issues.