Category: Technology

Agile Project Management for Cybersecurity

In our recent webinar, “Agile Project Management for Cybersecurity,” Myriad’s PMP and CSM-certified project manager Emma Sally presented an overview of agile project planning, its benefits and effects, terminology, how it compares to traditional practices, and how an IT department can implement this methodology today. Sally starts by providing a comparison of project management styles… Read more »

Understanding Data Loss Prevention

I’ll assume that you’ve watched the Indiana Jones movie Raiders of the Lost Ark – if not, be warned, there are spoilers in the next sentence.  At the end of the movie, the Ark is reported to be in a place that is “very safe.”  To which Indy replies, “From whom?” Later, the scene cuts to… Read more »

Network Visibility is A Security Must-Have 

Given the trends of massive growth in bandwidth, deployment of large enterprise data centers, and significant adoption of cloud-based applications, enterprise networks have become more challenging to secure and manage. Organizations now have a reliance on the network for critical business functions, including remote access to data center and cloud-based applications. This increased reliance on the network has… Read more »

Secure Email Gateways: Perimeter Security for the Mailbox

In the business world, 90 trillion emails are being sent each year. According to Kaspersky research, over 57% of those emails were classified as spam and malware. This makes email a very real threat vector that can infiltrate a user’s endpoint, branch offices, and even the data center. It’s important as ever to secure employee and user inboxes, and there have been continual advancements in security surrounding products that identify threats and… Read more »

UCaaS vs. UC: Keeping Up in The Modern World

Unified Communications (“UC”) and Unified Communications as a Service (“UCaaS”) are terms that have been widely overused in the tech industry, leading to confusion in the marketplace around what the terms mean, how they differ, and the benefits they bring to an organization.    Unified Communications refers to premise-based systems which provide the integration of real-time communication tools such as IP telephony, conferencing/collaboration, instant messaging & presence (IM/P), email with voicemail (UM), and additional communication applications (e.g. contact center, SMS, MMS, etc.) into a single… Read more »

Ransomware is A Real Threat

Within hours of the outbreak of WannaCry, it had infected more than 230,000 computers in over 150 countries. We’ve all heard stories describing the severe impacts organizations face after being targeted by ransomware. Ransomware is a big business for organized crime rings and, as some suspect, even state-sponsored agencies. According to industry experts, it’s estimated ransomware ransacked $1B in… Read more »

Complex Stakeholder Management 101

Over the past four years, I have helped develop Myriad’s project management practice. As a project manager, I am the main point of contact for our clients during a variety of projects, including office moves, wireless surveys, and infrastructure upgrades (greenfield and brownfield) just to name a few. Through my PMP certification and Lean Six Sigma Green Belt training, I… Read more »

Intel Debuts New Scalable Processors

It’s about that time again when everyone is talking cores, threads, and gigahertz.  Intel is starting to roll out their newest line of Xeon processors, which are being referred to as “scalable processors” powered by the new Skylake-SP core. The existing architecture had limitations around the number of cores and threads that Intel has been trying… Read more »

How Do You Protect Your Business When the Threat Landscape Is Always Evolving?

Staying ahead of the curve when it comes to security attacks can be a challenge many find to be nearly impossible to achieve. But why is it so difficult? Every day, attacks targeting juggernauts of industry are featured in breaking news. An example is the recent “Wannacry” ransomware attack, which affected thousands of computers all… Read more »

What I Do in IT Sales

“Sweetie, can you help me get my printer to work?” my mom called from the kitchen while I was visiting for Father’s Day last month. “Umm, I can try?” I stammered. These scenarios with family and friends have become commonplace since I began my IT career five years ago.  I’m sure other people can relate—when… Read more »