From the beginning of time, data has been the most valuable asset. Money, gold, diamonds and anything we’ve place a value on were merely constructs created to trade for this data. Just so happens, Ransomware is today’s construct. Created to conceal data theft, because what was once your data, will be sold. Do you understand …
BLOG
Stay up-to-date with news and stories from Kontinuum.

Do your back-ups work?
Last Friday we asked if your back-ups work. Many answered saying their in fact have back-ups. To be clear, we were asking if your back-ups work. Good back-ups are the unsung heroes of any Business Continuity & Disaster Recovery Plan. At some point you were probably told your systems have top notch security and are …

When we do I.T., it’s art in motion.
The future is here, are you ready? I challenge the status quo to disagree that mobility and remote workers don’t present the identical security concerns as those working in the confines of the “office”. Oh, you have security in place? That’s cute. Have the steps you’ve taken towards your little version of security been reactive …

Honesty is an expensive gift.
All too often, price is the defining factor in our industry without considering the opportunity cost of lesser solutions. After all, it almost always comes down to money. What does this mean to you and why should you care? Eight plus months ago you went remote, your ability to Work From Home (WFH) was put …

Reimagining the modern office.
I read an article this morning which lead me to writing this post scratching the surface of the distributed office/workforce, costs and the redistribution of some of those costs. Over the last eight plus weeks we have seen many of our clients successfully move jobs/tasks to a work from home environment. However, we have also seen some …

Is tele-medicine secure?
Fear mongering and cautious optimism have likely been the drivers behind IT expenditure in recent weeks. I’d wager few of those dollars were allocated to securing this “new work from home” bug that has bitten everyone. Aside from the health risks, COVID-19/Coronavirus has demonstrated and/or revealed the wanton disregard for IT security in the global workplace. No …

Our unwavering commitment to our clients.
For immediate release; As we continue to monitor Coronavirus (COVID-19) developments closely, the health and well-being of our people and you, our clients is of utmost importance to us. As a critical component to your business, we understand that limiting any impact this health event could have on our service to our clients is imperative. …

Maybe we’re just different.
So, you signed a contract that includes proactive monitoring. Great, you’re now one step ahead than the rest, or are you? To most Managed Services Providers, this proactive monitoring is limited to canned “sensors” that look at your hardware for low disk space, fans spinning too much and checking what features may be installed. What …

Is Virtual Desktop Infrastructure (VDI) dead?
What is the typical use case for VDI? You have workloads on internal servers where best practice dictates only controlled access from within your network is allowed. Fair enough. You were told VDI will save you money? How? Is my first question. You still need a computer to access the VDI from. That computer should be …