SOC 2, Type II Attestation Earned ​

We have recently earned a Service Organization Control (SOC 2) Type II compliance status. This is especially important as it communicates to our clients that we take care to respect and protect their data. This rigorous audit examines the suitability of the design and operating effectiveness of our managed infrastructure and IT services. Conducted by independent…

Integration Platform as a Service (iPaaS) with Dell Boomi

​Businesses are increasingly reliant on disparate on-premises and cloud applications – think CRM, ERP, and HRMS.  The challenge with this growth is managing the resulting information silos while achieving effective data integration. IT leaders are allocating increased resources to maintain vast amounts of custom code and APIs, only to yield complex and brittle solutions. Enter…

​​​​​​Microsoft Teams Finally Available for Government Cloud​

​Over the last year, Microsoft has added to the suite of solutions focused on collaboration. We’ve seen many clients benefit from these tools, which refocus resources toward reaching business goals. The Government Cloud user community has been patiently awaiting the launch of Microsoft Teams in this stack since the original launch on March 14, 2017….

​​Microsoft Announces General Availability of Azure DDoS Protection for Virtual Networks​

​While Distributed Denial of Service (DDoS) attacks are not new, they are one of the top availability and security concerns for companies considering a transformation to the cloud. ​ We’re seeing increases of type, scale, and frequency of occurrence as they are relatively easy and cheap to launch and often are motivated by extortion or hacktivism….

ALERT: Microsoft O365 Zero-Day Vulnerability​

A Microsoft O365 zero-day vulnerability has been reported by SCMagazine – and it’s being exploited across organizations of all sizes. Known as BaseStriker, the vulnerability is being used to lure users into Phishing attacks by bypassing built-in Office365 security protection. This allows the delivery of emails with known malware and phishing links to users. Delivery of malicious…

The C-Suite’s Responsibility in the New Era of Data Protection ​

​In the era of data breeches and information misuse, corporations across the world are being held accountable by stakeholders, customers and regulators to implement responsible privacy practices. This includes building and managing a security infrastructure as well as a plan for responding after an attack. According to the Check Point 2018 Security Report, 59 percent of companies…

​​​​​InfoSec Alert – GDPR Phishing Campaigns​

​​Several reports have recently emerged of email phishing campaigns attempting to lure business personnel to websites soliciting business and personal financial information. These messages include some wording demanding the recipient urgently take some action such as clicking a link and entering information in order for the purported sender to update their records. This latest campaign…

​​​​​​​​​​​Microsoft Azure and Cloud Products

Microsoft will frequently launch a new product or product enhancement with the status label of “preview” or “public preview”.​ The key Microsoft disclaimers to using a product or feature in preview status are as follows: 1)  All previews are excluded from Microsoft SLAs and Warranties 2)  Previews might not include customer support from Microsoft 3)  Preview…

​​​​​​Modernization Won’t Happen Without The Cloud

Modernizing your DevOps should include at least a partial cloud strategy. Transitioning enterprise applications for use in today’s digital atmosphere requires scalability, flexibility, automation, and the ability to support multiple application teams on-demand. This video from Microsoft outlines how insurance giant GEICO adopted a DevOps strategy that is transitioning development to Microsoft Azure. With the…

​​​​​​​​​​InfoSec Alert – RansomWare Threats Increasing

​This is an rmsource InfoSec alert. The purpose of this alert is to inform rmsource clients of current or imminent security concerns so that proper precautions may be taken. Executive Overview: There is always a temptation to think to ourselves, “that will never happen to us.” Such could certainly be the case when we think…