Microsoft continues to shake things up in the industry with two major announcements. First, it will be ending support for Windows Server 2008; while mainstream support ended in 2015, the official extended support end date is January 2020. If you’re still running this product, now is the time to consider upgrading to Windows Server 2019. […]

By Whitney Snoops | Jan 03, 2019 | Product of the Month

Read More

  CTI’s SHIELD Suite encompasses all of our Consult offerings. Our portfolio of customized assessments identify and prioritize your business requirements, match IT technologies and processes to business drivers, and deliver actionable recommendations to increase your productivity and reduce costs. Our Consult team excels at conducting rigorous evaluations of IT security controls, business continuity, and network […]

By Whitney Snoops | Nov 14, 2018 | Latest News, Product of the Month

Read More

In recent months the industry has seen an increase in the number of O365 customers who have experienced some type of compromise of the platform resulting in confidential data loss. CTI has also seen an alarming threat to the O365 landscape from our own customers. Now more than ever it is important to engage with […]

By Whitney Snoops | Oct 02, 2018 | Latest News, Product of the Month

Read More

Recently, a number of our clients have fallen victim to phishing scams, leaving their executives asking, “How did this happen?” and “What could we have done differently to protect ourselves?” Let’s take a look at some common types of phishing attacks as well as how you can protect yourself and your organization from becoming a […]

By Whitney Snoops | Aug 30, 2018 | Insights, Product of the Month

Read More

PRTG Monitors Every Aspect of Your IT Infrastructure What can PRTG do for you? Monitor the entire network Traffic, databases, applications, bandwidth, cloud services, server, virtual environments, uptime, packets, ports, hardware, security, memory usage, web services, disk usage, environments, IoT devices and everything you can imagine. Support most technologies SNMP (all versions), Flow technologies (such as NetFlow, jFlow and sFlow), […]

By Whitney Snoops | Aug 02, 2018 | Latest News, Product of the Month

Read More

Virtualization of the data center has proven to be a true IT game-changer, providing increased flexibility and control in managing mission-critical data assets, as well as essential cost savings. Organizations large and small continue to move forward with virtualization initiatives, either going completely virtual or operating – in varying ratios – in a hybrid physical/virtual […]

By Whitney Snoops | Jul 09, 2018 | Latest News, Product of the Month

Read More

When Moving to the Cloud is Too Cloudy Microsoft Exchange Server 2016 Microsoft Exchange Server 2016 brings a new set of technologies, features, and services to Exchange Server, the messaging platform that provides email, scheduling, and tools for custom collaboration and messaging service applications. Its goal is to support people and organizations as their work habits […]

By Whitney Snoops | Jun 10, 2018 | Product of the Month

Read More

GDPR: General Data Protection Regulation Deadline: May 25, 2018 The GDPR was approved and adopted by the EU Parliament on April 14, 2016 and goes into full effect on May 25, 2018. This applies to all companies processing the personal data of data subjects residing in the European Union, regardless of the company’s location. The […]

By Whitney Snoops | May 02, 2018 | Product of the Month

Read More

Cisco AMP for Endpoints Cisco AMP for Endpoints is a cloud-managed endpoint security solution that provides the visibility, context, and control to not only prevent breaches, but also rapidly detect, contain, and remediate threats if they evade front-line defenses and get inside, all cost-effectively and without affecting operational efficiency. Learn more about Cisco AMP for […]

By Whitney Snoops | Apr 09, 2018 | Product of the Month

Read More

Duo: A Total Access Solution Duo’s Trusted Access solution combines user identity, device control, and application protection to provide a secure and reliable solution to protect your business. The first step is user identity confirmation through two-factor authentication (2FA) and user access policies. Trusted Users combines with complete device control to screen what is accessing […]

By Whitney Snoops | Mar 09, 2018 | Product of the Month

Read More

1 2 3 5