...but not something you discuss with just anyone. And that is how we feel about I.T. Security.
I know we are supposed to market our wares to get you all hot and bothered with all the exciting tools we use, but think about this if you will;
Do you really want to expose your flanks, or would you rather be prepared to repel the attack(s) while gathering as much intel as possible to consistently be prepared as you can be for the next wave?
It's with this in mind we have taken all vendor mentions and logos off of our site, well except for Microsoft. Its pretty hard to do anything without them (no Windows XP machines here). I continue to stand by my credo of being forgotten by or clients (except when the invoice comes that is), after-all if we're doing our job, you'll be focused on other things and have that peace of mind we sold you.
Lets really dive in to this. Why aren't you innovating? Why aren't you an industry leader? Why are you behind your peers?
Let's use the Windows 7 example, because providers near and far are trying to sell this bit of snakeoil with particular vigor. And I promise you, the level of incompatibility with today's software and that extended support Windows 7 computer will only make your provider more money at well, your expense. And if your Line of Business software only works on an end of life solution, your LOB is end of life too.
Cost is more than just the direct cost of acquisition, its the total cost of ownership, the opportunity cost of not taking action or taking action.
Not once have I ever believed what was done today...
Let's face it, when it comes to fast, cheap and good, you can only pick two.
Nothing in life is free, not even those free assessments, vCIO and QBR services you're offered.
Because the foot got in the door and you were sold an incomplete experience.
What does free mean to you?
If it’s any of the preceding I promise you, nothing we offer is ever free, not even the coffee cup we gave you during setup.
We've been doing the I.T. thing for a long time and have always been more expensive than most, yes I just said we're more expensive and it's OK. That is because we understand there is a cost to expend resources on innovation and having a future forward outlook. How else can we be the tip of the spear for our clients.
It takes resources to keep the lights on, continue research and testing on products in our quiver or those we're considering to add, have our people working in the background for you and also answering...
While it's helpful to learn from the mistakes of others, it's those you aspire to be like you should listen to. These are the ones that found their way to the mountain top and endure the everyday battles to stay there.
If they haven't accomplished what you want to do, stop taking their advice.
Where am I going with this? You buy solutions all the time that are meant to deal with an issue you have, I'm willing to bet that when those solutions don't work, it's because the company that sold it to you does not use it in their own business processes. The easy answer most companies will have is, "we use another product we sell." My answer to that is, why aren't you selling me that product?
If you buy (I know the trendy word to use the word "invest" with our clients, but we have a business relationship with a series of business transactions) a solution from us, we use it unless it was specifically made for your industry. But when it comes to security and workflow, chances are...
What's the difference?
Our IT solutions provide you the tools, support, and expertise needed to focus on your lifes mission. At Kontinuum, we leverage leading-edge technology and world class systems to be the pre-eminent Managed Services Provider to enhance the way you do business now and in the future.
Every day, our managed users rely on Kontinuum to keep their technology running smoothly. Whether we're adding a new user, resetting a password, getting clients up-and-running after natural disasters or re-mediating ransomware, our Client Support team is your team.
No longer is your company secured at the perimeter alone, which is why the Kontinuum Expertly Managed Subscription includes our complete...
With the growing advancements in cloud technology and faster internet speeds, more and more companies are turning to Voice over Internet Protocol (VoIP) for their business communications. But just like with any service, you might run into some issues, particularly with call quality. Here are some of the common problems and how to address them.
The main factor in disjointed, start-stop sounding messages in a VoIP environment is packet loss, which occurs if individual data “packets” are lost in transmission. When this occurs, the gateway at the receiving end of the call tries to predict what’s been lost; but when it can’t, the gap in data remains empty, resulting in choppy audio.
Insufficient bandwidth is often to blame for this issue, so make sure to check your bandwidth usage. Limit the use of bandwidth-heavy applications (e.g., video streaming apps) and tweak your router settings to prioritize VoIP traffic. Also run a test for malware or...
Up until a few years ago, that buzzing box sitting in a room you're paying to keep cool all year around was the pinnacle of file/data security. But how secure is it today?
We have moved forward by leaps and bounds in the technology world, and the last vestige of that bygone era is the beloved files server.
We are in the middle of the technology renaissance.
Let me make it clear, I'm not saying the cloud is more secure. What I am saying is the cloud is more flexible and adaptable to implementing new security measures.
Right now you’re probably thinking, are they crazy?
I can assure you that is not the case here. We have insight coupled with foresight. Today is 200 days since we ditched on premise servers in favour of a cloud hosted solution.
This post is about changing mindsets and expectations, the biggest gaping hole in modern security is what happens to the files when they are in the wild, i.e. they’ve been emailed to someone or your firewall...
That is a pretty heavy question and everyone has a different answer. To be of service to all of our clients we've put together a list of questions below to help you understand what peace of mind could be for you, is it;
If any the above resonates with you, then Peace of Mind for you may be our Expertly Managed Subscription.
At its very basic premise, our Expertly Managed Subscription...
With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected.
The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials. Scammers use this previously unseen tactic by launching a phishing message to users, asking them to click on an embedded link. What makes this scam more insidious than traditional phishing scams is that the URL within the message links to a real Microsoft login page.
The phishing message resembles a legitimate SharePoint and OneDrive file-share that prompts users to click on it. Once they do, they are taken to an Office 365 login page where they will be asked to log in if they haven’t already.
After they’ve logged in, they’ll be prompted to grant...
People today expect Wi-Fi access when they’re visiting your office. However, setting up your Wi-Fi the wrong way can create a stressful experience for them. Additionally, this can also expose your confidential information to malicious hackers. So what’s the right way to do it?
Giving your guests access to your company’s main Wi-Fi connection might seem like a good idea, but you should avoid this at all costs.
Anyone with a little technical know-how can potentially access everything on your company network, including confidential data. In addition, if any of your visitors’ mobile devices have been compromised, it’s possible that they can transmit malware to your entire network.
If your router comes with built-in guest Wi-Fi support (you can check this feature through a quick web search), you can use it to create a separate “virtual” network. This means...