We’ve bid 2018 farewell and welcomed 2019 with open arms. So what's next? What’s going to happen in 2019 from an infrastructure perspective? The answer for 2019 is similar to that of recent years. Cloud and security are still the top priorities. Let’s take a quick look at what may impact your infrastructure focus. 1. Exchange Migration Migrations from Exchange on-premises to Exchange online and upgrades from older versions of Exchange to the latest version are both projects going strong in 2019. We continue to support our clients who are going through these Exchange migration and upgrade processes and predict that Exchange migrations, upgrades, and support will continue to be a trend with our clients. 2. Multi-Factor Authentication To add [...]
The average person receives 16 malicious emails per month. A 2018 study of 500,000,000 emails found one out of every 101 emails received were malicious. Are your employees properly educated about this? Or will they click a link that could cost the company millions? Most of the time, the greatest risk to your company’s internet security are the people who work for it (including you). One click on a malicious email—even one that looks like it comes from a friend—could seriously damage your company. New employees are the most at risk for being duped.  What is Spear Phishing? Spear phishing is an attack in which hackers trick targeted users into sharing confidential information. It can also involve tricking the [...]
Sometimes, important changes happen without anyone noticing. That was the case recently as Red Level greatly expanded our West Michigan datacenter footprint. We’ve been watching closely as the Grand Rapids-area market has grown and changed in recent years. Grand Rapids has been emerging as a powerful new hub for information technology-focused companies, both in the form of innovative start-ups and as a destination of choice for established companies looking to expand into a new market or relocate their operations. At the same time, a lot of the area’s established businesses have been embracing cloud-based solutions as a means of building their capabilities and modernizing their IT operations. Naturally, as the markets we serve and our clients’ needs grow, we need [...]
Phishing threat is no joke, despite the widows and princes. The phishermen are out there – just make sure you don’t get caught. Imagine: You come into work one morning and open a typical, innocuous-looking email. Unknown to you, that sets in motion a chain of events: Malicious code within the virus embeds itself within your laptop, forcing it to perform a series of hidden procedures that open gateways to your data, send spam emails to your contacts, and reproduce copies of the code. By lunchtime, several of your colleagues’ machines are doing the same thing. Twenty hours later, your entire network is infected, and all 70 employees are idled for two days! Can it happen? It happened recently to [...]
Grab the popcorn and dim the lights. It's the perfect time to cozy up with your favorite Christmas movie. We gathered the team together to share a few of their favorite holiday films and a few ideas that should top every CIO's Christmas wish list.