<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

Solutions II Blog

5 Effective Ways to Increase Data Security

Posted by Solutions II on Aug 7, 2019 2:05:22 PM

Hackers show no signs of abating their attacks on businesses. The data that businesses generate is just too valuable for cybercriminals to ignore.

Read More

Topics: Data Protection, Security, Service+Protect, professional services, Security Controls, Service+Secure, Cybersecurity, IT Security

Insider vs. Outsider Data Security Threats: Are you taking risks?

Posted by Solutions II on Jul 24, 2019 6:48:23 AM

Whether insiders or outsiders pose a greater threat to security is a matter of ongoing debate. According to Verizon’s 2018 Data Breach Investigations Report, 73% of cyberattacks were executed by outsiders and 28% of attacks involved insiders. 

Read More

Topics: Data Protection, Security, Service+Protect, professional services, Security Controls, Service+Secure, Cybersecurity, IT Security

Red Hat Purchase of CoreOS - Big Deal or Just Another Day?

Posted by Jeff Walton on Mar 1, 2018 10:05:00 AM

­Several of our clients run Red Hat Linux Operating Systems. So, when reading this headline about a cloud security company which was just purchased by Red Hat for a cool $250 million, I thought I’d report on why this is kind of a big deal.

Read More

Topics: Cybersecurity, IT Security