<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

IT Solutions Blog

The New Frontier: Security Threats | Solutions II Security Experts Weigh In

Posted by Solutions II
As we approach mid-year 2023, technology continues to advance at an unprecedented rate, bringing myriad opportunities for businesses and organizations to excel in their respective industries. However, such rapid advancements have also exposed us to a new set of challenges, one of which is cybersecurity.

Read More

CJIS Compliance & Audits in Public Safety

Posted by Jeff Robbins

Adhering to stringent cybersecurity standards is not only a good first-line defense against cyber-attacks, but it’s also a requirement for government agencies.

Read More

Solve the Problem of Cyber Asset Attack Surface Management

Posted by Solutions II

Solutions II, an award-winning Solution Provider specializing in Security, IT Managed Services, Hybrid Cloud, Data Management, Infrastructure, and Hybrid Maintenance solutions, is launching ASM (Attack Surface Management) Illuminate as a next-level service to protect your organization from a cyberattack.

Read More

Cyber Threats and Public Safety: Why Ransomware Can Be a Matter of Life or Death

Posted by Jason Norred

While businesses regularly deal with the operational disruptions and financial ramifications of cyber-attacks, it’s a different situation in the public sector, where state and local agencies hit by ransomware can quickly transform into a matter of public and personal safety.  

Read More

Five Takeaways from the Gartner IO Conference

Posted by John Wondolowski

After spending last week in Las Vegas at the Gartner Infrastructure Operations and Cloud Strategy Conference – here are our five takeaways for IT Leaders.

Read More

Attack Surface Management: Learning from a Real-world Cyber Attack

Posted by Jacob Haynes

In order to understand the magnitude of an organization's attack surface, let's walk through a real-life attack scenario and see how Attack Surface Management (ASM) could have protected the organization from getting hit with ransomware.

Read More

Attack Surface Management: Designing a Robust Program in Seven Steps

Posted by Jacob Haynes

Our goal as cyber-defenders is to look at our organizations from the cyber-attacker’s viewpoint, reduce the attack surface, and reduce the impact of a cyber-attack. Here are seven important steps to include in your Attack Surface Management program:


Read More

Educate Employees on Avoiding Security Breaches

Posted by Solutions II

It’s a truism that educating employees is one of the most important steps to preventing security breaches in the workplace. In fact, one survey found that two thirds of the professionals charged with data protection and privacy training point to employees as the largest source of failure in corporate IT security measures.

Read More

Something Looks Phishy

Posted by Solutions II

Earlier this month, an investigation by the FBI’s Cyber Task Force in partnership with the Washtenaw County Sheriff’s Office and the Michigan State Police, led to Konrad Voits (27) guilty plea to damaging a protected computer within Washtenaw County government computer system. Voits’ motive focused on altering computer records of an inmate in an effort to get that inmate released early. The fact that Voits succeeded in altering a government computer system is astonishing. The thought that it can happen to your organization is terrifying! How does this happen and more importantly, what can you do to ensure your organization and IT architecture is better prepared to handle these types of threats!

Read More

To Click or Not To Click

Posted by Solutions II

Cyber Security firms are innovating at a pace never seen before trying to keep with various attack vectors facing organizations and individuals alike. It’s no secret that cyber security is a lucrative area to be in, but what is really driving this huge market and will it ever slow down? The speed and sophistication of attacks that happen to corporate America are on the rise and businesses that once held the stance of “we’re not at risk of being hacked” are now admitting that it’s no longer a question of “if” but “when”. With these escalating concerns, businesses are forced to pay big bucks to security firms to help reduce their risk, or look into IT managed services. They are also spending more on remediation of existing deficiencies as evidenced by this statistic and article from Business Insider: Cybersecurity is a $81.7 billion market - and startups are raking in the dough

Read More