sliderartside2

PROSUM BLOG

Zoom in on Prosum's Technology Insights with Our IT Blog

Top 5 Reasons to Move to Windows 10 – Today!

If you’re not using Windows 10 already, you’re already behind the curve! Microsoft’s latest operating system has been released for more than two years now, and the early adopters have ironed out all the bugs that have plagued new Windows releases for years.

How the New EU Privacy Regulations Affect Your Local IT Department

May of 2018 - are you ready? 

That’s when the new General Data Protection Regulation (GDPR) takes effect in the EU. Haven’t heard of it? In short, it’s a new information security law that affects anyone providing goods or services to individuals in the EU, or anyone who collects and analyzes data tied to EU residents.

What You Need to Know About KRACK

What is KRACK?
KRACK is a new network Wi-Fi attack on Wireless Access Points that exploits vulnerabilities within WPA2 Wi-Fi Protocol (The security format that protects Wi-Fi networks).
What is the potential impact? 
If affected, the attacker has access to connected Wi-Fi devices to eavesdrop and inject data into the wireless stream to install malware or adware.

How Identity Security Keeps You Safe

Authors: Will Udovich and Geoffrey Kneale

We’ve been talking a lot about security, and specifically Identity security lately (View: Long Live Identity Security and Identity Security Checklist). But what does a security breach look like? Unfortunately, one of our customers recently fell victim to a phishing scam, illustrating how easy it is for any organization to be compromised.

Identity Security Checklist

What is identity management? Enabling the right individuals to access the right resources at the right times and for the right reasons. It’s your first line of defense in the new world of computing security.

But how do you get started with identity management and ensure you are employing the right roadmap for your business? In an effort to get our customers on that right track, we’ve put together a quick Identity Security Checklist that you can use to see where you’re at and where you ought to be going.

Security: The Perimeter is Dead! Long Live Identity!

Authors: Will Udovich and Steve Andrews

You’ve likely heard a lot about security in the last six months. Between crypto-ransomware and security breaches at some of the world’s largest companies, it seems that the security practices that have kept us safe for years no longer are doing the trick… but why?

Let me take you on a brief journey.

Ransomware 'WannaCrypt' Alert

As a result of a recent, widespread attack on Microsoft Windows Systems, Prosum is providing the following information  in order to ensure rapid action to remediate the attack vectors allowing the ‘WannaCry’ (Also known as ‘WannaCrypt’) crypto virus to spread.

Why Your Search for an IT Superhero May Actually Be Your Undoing

Author: Josh Tofteland, Vice President

There’s an IT crisis brewing in your company. You’re understaffed and overwhelmed and looking to the skies for someone to swoop down to the rescue. You watch. You wait. And nothing. Where is that super-certified crusader of code, armed with your lengthy list of “must-have” requirements along with a utility belt of impressive “nice to haves?”

Forget it.

The BI Journey: Part Five

Author: Carol Jenner, Sr. Business Intelligence Architect

We're coming to an end of the Business Intelligence (BI) series, and I hope you can see how the journey can help you improve your organization’s BI maturity. If you are just joining us, be sure to read the first four parts of the BI Journey series covering these topics: What is the Business Intelligence (BI) Journey?, Why Your BI Journey Should Start with a Data Strategy, The Early Stages of the BI journey, and The Middle Stages of Your BI Journey.