<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

Solutions II Blog

Red Hat Purchase of CoreOS - Big Deal or Just Another Day?

Posted by Jeff Walton on Mar 1, 2018 12:05:00 PM

­Several of our clients run Red Hat Linux Operating Systems. So, when reading this headline about a cloud security company which was just purchased by Red Hat for a cool $250 million, I thought I’d report on why this is kind of a big deal.

Read More

Topics: Cybersecurity, IT Security

Social Media Vulnerability

Posted by Matt Gourley on Feb 14, 2018 11:25:00 AM

SocialMedia.jpgAs businesses embrace the digital information age and the diverse tool sets to engage with the community many have found these very tool sets can be a double edged sword with potentially devastating effects. Remember when HBO had sensitive information regarding one of its hottest shows Game of Thrones find its way onto Twitter?? Today businesses have to ensure that the channels with which they operate are as locked down as their data repositories are.

Read More

Topics: Cybercrime, Service+Secure, Cybersecurity, IT Security, Vulnerability

Educate Employees on Avoiding Security Breaches

Posted by Solutions II on Feb 7, 2018 3:04:00 PM

SecurityBreach2.jpgIt’s a truism that educating employees is one of the most important steps to preventing security breaches in the workplace. In fact, one survey found that two thirds of the professionals charged with data protection and privacy training point to employees as the largest source of failure in corporate IT security measures.

Read More

Topics: Security, Security Breach, Service+Secure, Cybersecurity, IT Security