sliderartside2

PROSUM BLOG

Zoom in on Prosum's Technology Insights with Our IT Blog

How Identity Security Keeps You Safe

Authors: Will Udovich and Geoffrey Kneale

We’ve been talking a lot about security, and specifically Identity security lately (View: Long Live Identity Security and Identity Security Checklist). But what does a security breach look like? Unfortunately, one of our customers recently fell victim to a phishing scam, illustrating how easy it is for any organization to be compromised.

Identity Security Checklist

What is identity management? Enabling the right individuals to access the right resources at the right times and for the right reasons. It’s your first line of defense in the new world of computing security.

But how do you get started with identity management and ensure you are employing the right roadmap for your business? In an effort to get our customers on that right track, we’ve put together a quick Identity Security Checklist that you can use to see where you’re at and where you ought to be going.

Security: The Perimeter is Dead! Long Live Identity!

Authors: Will Udovich and Steve Andrews

You’ve likely heard a lot about security in the last six months. Between crypto-ransomware and security breaches at some of the world’s largest companies, it seems that the security practices that have kept us safe for years no longer are doing the trick… but why?

Let me take you on a brief journey.

Ransomware 'WannaCrypt' Alert

As a result of a recent, widespread attack on Microsoft Windows Systems, Prosum is providing the following information  in order to ensure rapid action to remediate the attack vectors allowing the ‘WannaCry’ (Also known as ‘WannaCrypt’) crypto virus to spread.

Why Your Search for an IT Superhero May Actually Be Your Undoing

Author: Josh Tofteland, Vice President

There’s an IT crisis brewing in your company. You’re understaffed and overwhelmed and looking to the skies for someone to swoop down to the rescue. You watch. You wait. And nothing. Where is that super-certified crusader of code, armed with your lengthy list of “must-have” requirements along with a utility belt of impressive “nice to haves?”

Forget it.

The BI Journey: Part Five

Author: Carol Jenner, Sr. Business Intelligence Architect

We're coming to an end of the Business Intelligence (BI) series, and I hope you can see how the journey can help you improve your organization’s BI maturity. If you are just joining us, be sure to read the first four parts of the BI Journey series covering these topics: What is the Business Intelligence (BI) Journey?, Why Your BI Journey Should Start with a Data Strategy, The Early Stages of the BI journey, and The Middle Stages of Your BI Journey.

Veeam Backups and Microsoft Azure StorSimple

The Microsoft Azure StorSimple appliance can make a suitable repository for Veeam backups in many scenarios to provide a simple, disk-to-cloud backup solution for archiving and disaster recovery. Use the following guidelines to help define a solution that fits your organization.

Prosum’s Denver Team Moves to Larger Office Space

Less than two years after opening Prosum’s Denver office, we have packed up and are settling into a larger office space to accommodate our growing team and client base. The new Denver office is 5 times the size of the old space, allowing us to better serve our clients and provide a more collaborative working environment for our current and future team members.