Technical Support: 412-349-6678 | Incident Response

Blog & Latest News

How to Create a Disaster Recovery Plan

How to Create a Disaster Recovery Plan – Pt. 1

Recently, Hurricane Dorian slammed into the Bahamas, and drifted north up the Atlantic Ocean.  Our thoughts and prayers go out to those affected by the storm! Even as our thoughts go out to others, we must also use this devastating incident to remind ourselves that disasters happen.  Use this as an...
The End is Near for Windows 7 - Keyboard with Windows Button

The End is Near for Windows 7

The End is Near!  At least, for Windows 7… Jan. 14, 2020 will be the last day that Microsoft will provide security updates for Windows 7.  The software will still work on existing PCs, but it will become increasingly vulnerable to malware because Microsoft will discontinue regular support and security...
Cyber Kill Chain Model - Ideal Integrations

The Cyber Kill Chain Model is Obsolete

In the early 2000s, Lockheed Martin defined the cyber kill chain framework to identify the stages in which cyber adversaries attack an organization.Tom Kellermann, chief cybersecurity officer at Carbon Black, now declares that model insufficient.As covered by Aaron Tan of, the original cyber kill chain model identifies a sequence...
Amazon Alexa Device - Network Exploits - Ideal Integrations

Unexpected Network Exploits

Small businesses often talk to IT vendors strictly in terms of computers. Certainly, network design for the personal computers and servers is a critical baseline, but often it fails to capture the reality of the modern office. Voice over IP telecom systems, smart phones, voice-activated devices such as the Amazon Alexa, and...
Benefits of Cloud Computing - Ideal Integrations

The Benefits of Cloud Computing

 The traditional office and workspace layout looks nearly unrecognizable compared to 10 years ago. As technology moves to more virtual and mobile spaces, staying connected to vital company documents and resources proves to be catalytic to a successful company. Cloud computing ensures improved work experience through hosting servers, networks, and...