Blog
May 19, 2017
How to Fast Track your Microsoft Email Migration

Integration Partners can help FastTrack customers looking to perform Microsoft Email Migrations.  We have services and project managers along with resources, tools, and experts to migrate your Exchange to Exchange online.   A successful rollout focuses on driving adoption and helping everyone understand the benefits of working in a new way.  Below is a quick overview of…

Read More

SKYPE FOR BUSINESS
April 3, 2017
11 Tips for Avoiding Skype for Business Deployment Mistakes

Microsoft’s Skype for Business is all the rage in today’s ever-connected enterprise world. But taking this unified communications tool at face value will only reduce your potential return on investment. Just like the on premises PBX that you installed years ago, Skype for Business requires a blueprint for deployment and usage to fully reap the…

Read More

February 20, 2017
Six Best Practices for Securing Your Internet of Things (IoT) in Healthcare

The world of IT security is a journey with no arrival date and many twists and turns and not everyone takes the same path. The everyday challenges are monumental. This becomes even more amplified when you’re trying to manage and secure Internet of Things (IoT) devices. More and more, IoT seems to represent the Internet…

Read More

December 19, 2016
The Top 5 Challenges when Deploying In-Line Security Appliances

  The Top 5 Challenges when Deploying In-Line Security Appliances   Year in and year out, cyber attackers prove that they are increasingly capable of evading enterprise security as some of the world’s largest companies suffer data breaches.   Mainstream coverage of major cyber attacks has led enterprise executives to take a closer look at…

Read More

October 13, 2016
Three Questions to ask your Current Anti-Virus Provider

In today’s hyper-connected world, end points and user authentication have become the new perimeter and cybercriminals will continue toward breaching both. Current Anti-Virus tools rely mainly on signature and/or cloud-based updates to protect end points however, cyber criminals know this and know how to circumvent it. No longer can users wait for updates to be…

Read More

August 26, 2016
Something about September and Microsoft Office 365

It’s time for Moms, Dads, and caregivers of all kinds to get our kids ready for what we hope will be their best school year ever. The stress of September doesn’t just land on their little shoulders, however. I know that many in my work life are gearing up for the busiest time for the year professionally,…

Read More

Defcon Blackhat
August 18, 2016
What's a DefCon Social Engineer ?

Recently, I was in Las Vegas Nevada. I know what you’re thinking – what a lucky guy to be spending time in Sin City gambling. Actually, I was there to attend and participate in two well-known security events – Black Hat and DefCon which are two of the largest Cyber Security conferences in the world.…

Read More

June 28, 2016
Help your security posture by eating your vegetables - wait, what?

How your organization’s security posture is much like your health Recently I was speaking with a CISO of a mid-sized organization about their upcoming plan to test their security environment and I asked him when was the last time they performed this type of test. His answer was it has never been tested before and…

Read More

March 27, 2015
The Impact of Digital Natives

Digital native From Wikipedia, the free encyclopedia “The term digital native can be used to describe people born after 1980, when social digital technologies, such as Usenet and bulletin board systems, came online. Digital natives are characterized as having access to networked digital technologies and the skills to use those technologies. Major parts of their…

Read More

1 2 3 5