Tags:

Date: 10 January 2017

Author: Nicole Brinson

We're Hiring! - Solutions Architect - Microsoft Solutions

WHAT YOU’LL BE DOING:

This position supports Bedroc’s professional services division as a Solution Architect focusing on Microsoft Solutions. The below outlines key skillsets and areas of responsibilities:

  • Assist in the planning and design of Microsoft Solutions
  • Execute the deployment, integrations, and migration of Microsoft Active Directory Solutions
  • Work with clients to gather requirements and develop scopes of work
  • Develop Standard for Checklist and process for implementing Solutions
  • ..
Date: 07 December 2016

Author: Matt Bynum

It’s like Alexa, but with a little less HAL 9000

Shocker, I’m a Nerd

I grew up LOVING Star Trek: The Next Generation.  One of the key elements of this show was the ship’s computer, LCARS, which could control and interact with various other systems and sensors of the ship on behalf of the crew.  If I had to pinpoint anything in my life that drove me to IT, I think it would have to be how much I enjoyed the idea of the helpful computer in ST:TNG that made people’s lives easier.

You can imagine the waves of childish joy that fell over me upon..

Date: 29 November 2016

Author: Nicole Brinson

Healthcare Companies Turning to Managed Service Providers for Consistency in IT

As the healthcare landscape continues to evolve on an almost daily basis, many hospitals and healthcare organizations have found that enlisting the assistance of a healthcare managed services provider (MSP) is an ideal way to address some of the challenges they face while working to provide exceptional care. IoT, collaboration and growing security threats are just a few of the daily challenges a healthcare provider faces. 

There are serveral compelling reasons for enlisting a healthcare MSP,..

Date: 16 November 2016

Author: Matt Bynum

The Times, They are a Automatin'

 

In Remembrance of the “Good Old Days”

Do you remember how much less complicated IT used to be?  Don’t get me wrong, being in IT has always been challenging.  There’s always been enormous pressure on IT from the business, mostly because there has been this pervasive struggle to leverage IT to create an advantage against competition. Therefore, in lieu of strategic value, IT has sometimes been relegated to the category of “cost center”.  Some of you may even be in IT departments that report up..

Date: 31 October 2016

Author: Nicole Brinson

Healthcare: Meet Digital Disruption

Clinical-grade cloud + mobile technologiesWhat’s in your healthcare equation?

Control your own medical records and get seamless, immediate access to doctors and specialists whenever you need them.

Customer service expectations are higher than ever, and patients are ultimately customers. They expect the same levels of service at the doctor’s office or hospital that they are accustomed to from other businesses, and that includes digital services accessible through their mobile devices...

Date: 26 October 2016

Author: Nicole Brinson

Here's One Strategy for Thwarting Denial of Service Cyberattacks

Companies can reduce the risk from the type of cyberattack that took out major websites on Friday by using multiple vendors for the critical Internet service known as a domain name service, or DNS, companies and security experts said on Sunday.

“We have advocated for years for redundancy in your infrastructure,” said Kyle York, chief strategy officer for Dyn, the New Hampshire DNS provider that was attacked on Friday. “I don’t think you can ever be safe enough or redundant enough.”

Hackers..

Date: 24 October 2016

Author: Nicole Brinson

How Your Baby Monitor, Smart Thermostat and Tablet Helped Hackers Bring Down the Internet.

On Friday, October 21, a massive cyberattack affected many users of popular websites like Twitter, Netflix, Etsy, Spotify and Airbnb, among others. Dyn, a company that manages website domains and routes internet traffic, experienced two distributed denial of service (DDoS) attacks on its DNS servers, beginning at 7am on Friday. A DDoS attack is an attempt to flood a website with so much traffic that it collapses under the load. Think the volume of a fire hydrant rushing through a garden hose.

..

Date: 22 October 2016

Author: Nicole Brinson

Could Mr. Robot Hack Your Vote?

There are only 18 days left until (hopefully) everyone heads to their neighborhood polling locations to vote for the next U.S. President, a few Senators, their U.S. Representatives and a slew of state and local offices. A large majority of us will vote the old-fashioned way, with some version of a paper ballot, either with a pen checking boxes or a machine punching holes. A handful will vote with a voting computer that will also produce a verifiable paper receipt. Fewer people still will use..

Date: 13 October 2016

Author: cwilkinson

Don't Jump! How to Handle a Ransomware Attack

STEP:1 CALL BEDROC

Ransomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The Institute for Critical Infrastructure Technology recently released a report that in part describes how to deal with criminals when they are holding your data hostage. The report talks of what to do once a breach has been found.

ICIT says the proper response will depend on the risk tolerance of the..

Tags:

Date: 19 February 2015

Author: cwilkinson

FireEye: A Full Solution

by Todd Plambeck, VP of Technology at Bedroc

I recently attended a Lunch & Learn with our regional FireEye Team. My goal of attending the meeting was to understand the integration capabilities of the FireEye Solution and how the Mandiant Endpoint Software (now HX) features are progressing. Bedroc has been a FireEye Partner for approximately eighteen months and was recognized at FireEye’s Momentum 2015 Conference for putting together one of their largest deals of 2014.

The training started with..

Tweets