Skip to main content
All Posts By

Steven Pressman

Steve is responsible for the strategic direction of the company and its products. He serves as the chief solutions architect, coordinating architecture and DevOps efforts for cloud, hybrid, and on-premises infrastructures. Read his full bio here.

The Impact of Working Remotely on Endpoint Security Management

By Cybersecurity

In our last blog post, we introduced, defined, and explained Endpoint Security Management and why your company should have endpoint protection in place. In part two of this series, we explore how and why the shift to working remotely is changing the IT and cybersecurity landscape and increasing the need for endpoint security tools. Working Remotely Has Changed the Technology Game It’s not a stretch to say that the sudden shift to working from home in 2020 thanks to COVID-19 caught a lot of people and companies by surprise. In an instant, everything changed with new policies, procedures, and, in…

Read More

What is Endpoint Security Management?

By Cybersecurity
What is Endpoint Security?   You’re probably familiar with terms like “ransomware”, “malware”, “phishing”, and “data breaches” and (hopefully) have tools in place to help prevent those cybersecurity attacks. But, what about Endpoint Security? If that term is new to you, it’s ok; I’m here to help you understand what it is and why Endpoint Security Management is a crucial component of your company’s security posture. Endpoint management is the process of ensuring that anything (including servers, desktops, laptops, tablets and smartphones) that’s used to access your company’s network is secured, monitored, and managed. Or, in simpler terms, it’s making…
Read More

Put It In the Cloud. It’s Safer There.

By Cloud Computing, Cybersecurity
Times Have Changed – For the Better It wasn't long ago – maybe 10 years – that the headline of this article would have blown my mind.  And I'd probably have dismissed this whole blog post as ridiculous propaganda.  But times have changed. If you're still a cloud naysayer, even after all this time, I don't expect this little post to fully change your mind.  But maybe it can put a chip in your preconceptions. And I'm not going deep here.  If you want to talk more, question my assumptions, or even rage from your rooftop, please feel free to…
Read More

How The Grinch Stole… Your Information – Part 1

By Cybersecurity
We'll start out by stating the obvious: Thieves stink. Nobody likes to get robbed. More so, nobody likes to admit that they didn't prevent thieves from entering their house and taking their stuff. So generally speaking, it is always a good idea to lock your house's windows and doors. Apply that same mindset to your home network. When most people think of their network, they focus on their laptop and desktop computers. But in this day and age, networks are much broader! Your network is comprised of your computers, phones, home automation components, smart TVs, smart appliances, and more. Each of…
Read More

Cloud Misconceptions: My data center is more secure than the cloud

By Cloud Computing One Comment
Thanks to marketers, salespeople, and old school big-iron IT grognards, the term "Cloud Computing" has become as amorphous as its puffy, shapeshifting namesake.  Movies, commercials, scandals, and phone features have thrown the term around to the point where it has become very difficult for the average IT professional to define.  Cloud has hit a point in its hype cycle where people understand just enough to be dangerous -- and this lack of knowledge tends to lead to misconception and oversimplification of an otherwise deeply stratified and diverse set of technologies. In this blog post, I aim to debunk for the Cloud Noobs out there…
Read More