The Defense Federal Acquisition Regulation Supplement (DFARS) is a supplement to the Federal Acquisition Regulation created by the Department of Defense (DoD) that dictates how the DoD purchases or leases goods and services from contractors or subcontractors. This supplement is intended to protect the DoD from data breaches and other cyber attacks, particularly those resulting […]

By Keith Millett | Oct 03, 2018 | Insights

Read More

IT plays a critical role in any organization, whether your IT department consists of a single person doing basic maintenance or a team of individuals researching and implementing insightful IT solutions. Regardless of your specific team size, you may find that your organization needs the assistance of a third-party IT solutions and consulting partner that […]

By Keith Millett | Oct 03, 2018 | Uncategorized

Read More

In recent months the industry has seen an increase in the number of O365 customers who have experienced some type of compromise of the platform resulting in confidential data loss. CTI has also seen an alarming threat to the O365 landscape from our own customers. Now more than ever it is important to engage with […]

By Keith Millett | Oct 02, 2018 | Latest News, Product of the Month

Read More

Recently, a number of our clients have fallen victim to phishing scams, leaving their executives asking, “How did this happen?” and “What could we have done differently to protect ourselves?” Let’s take a look at some common types of phishing attacks as well as how you can protect yourself and your organization from becoming a […]

By Keith Millett | Aug 30, 2018 | Insights, Product of the Month

Read More

Part of creating an effective IT department is choosing the right infrastructure for your organization. Of course, right is a subjective quality that varies from one organization to another. Although a custom IT solution benefits your organization in the long run (rather than settling for a one-size-fits-all approach), it can be overwhelming to choose the […]

By Keith Millett | Aug 30, 2018 | Insights

Read More

The function of any organization’s IT department is to allow businesses to get to their information as quickly and reliably as possible. As an IT employee, you help bridge this gap and resolve any issues that might prevent company goals from being met. Although you’re given the opportunity to think critically, you aren’t always encouraged […]

By Keith Millett | Aug 03, 2018 | Insights

Read More

Chances are, your IT department is overwhelmed by a variety of never-ending projects. Because of this workload, your team needs to prioritize which tasks get done and when; as a result, they might opt to put off some of the more routine maintenance in favor of completing a more pressing project. In theory, that sounds […]

By Keith Millett | Aug 03, 2018 | Insights

Read More

PRTG Monitors Every Aspect of Your IT Infrastructure What can PRTG do for you? Monitor the entire network Traffic, databases, applications, bandwidth, cloud services, server, virtual environments, uptime, packets, ports, hardware, security, memory usage, web services, disk usage, environments, IoT devices and everything you can imagine. Support most technologies SNMP (all versions), Flow technologies (such as NetFlow, jFlow and sFlow), […]

By Keith Millett | Aug 02, 2018 | Latest News, Product of the Month

Read More

Virtualization of the data center has proven to be a true IT game-changer, providing increased flexibility and control in managing mission-critical data assets, as well as essential cost savings. Organizations large and small continue to move forward with virtualization initiatives, either going completely virtual or operating – in varying ratios – in a hybrid physical/virtual […]

By Keith Millett | Jul 09, 2018 | Latest News, Product of the Month

Read More

Healthcare organizations live and breathe the rules of HIPAA, legislation intended to protect patients and their sensitive information. Unfortunately, HIPAA compliance is only the beginning of a comprehensive (and complicated) cybersecurity strategy that reduces the risk of data breaches—and it fails to explicitly guide healthcare organizations on how to handle protected health information (PHI) and […]

By Keith Millett | Jun 20, 2018 | Insights

Read More