//mega nav ctas

OneNeck Blog

April 26, 2022

Cyber insurance prices are soaring. What should you do?

Cyber insurance is getting harder for companies to find — and it’s likely going to get harder. While cyber insurance is becoming more of a must-have for businesses, the explosion of ransomware and cyberattacks mean it’s also becoming a less enticing business for insurers. (Source: Harvard Business Review)

Continue Reading

April 18, 2022

Leverage Managed Detection and Response to Stay Ahead of Threats

We live in an age when passive security isn’t enough to protect company infrastructure. Security solutions must seek out and respond to unknown threats. Managed detection and response (MDR) provides companies with the security capabilities they need for the modern era. 

Continue Reading

April 14, 2022

Wasting Money Trying to Save Money in the Cloud?

The question is no longer if your company should invest in the cloud, but rather how much of your organization’s resources must go towards cloud-based infrastructure and services. In 2020 over 90% of all organizations used public cloud services (Source: DevOps) while spending over $50 billion.

Continue Reading

April 14, 2022

Microsoft 365 Pricing Updates for Nonprofits Coming Soon

There's been a lot of changes happening in recent months around Microsoft's license pricing (aka New Commerce Experience), and most recently, Microsoft announced new pricing is coming for Microsoft 365, directly impacting nonprofits. On September 1, 2022, the following nonprofit price updates* will go into effect:

Continue Reading

April 12, 2022

A Quick Overview of Azure DevOps

Advances in technology are happening faster than ever. Just look at the increase of patents filed every year. No wonder business leaders feel the pressure to deliver applications and services at mach speed. But a common challenge they run into is that siloed development infrastructure makes fast development difficult. This is where DevOps can help. DevOps was developed to tear down the walls between departments, improving communication and collaboration.

Continue Reading

March 31, 2022

Why Your Company Should Care About Endpoint Security

Businesses are increasingly dependent on technology. And data is essential to the efficiency of that technology as well as future business decisions. With its increased use in business operations comes a larger attack surface. So, shouldn’t companies that prioritize technology also prioritize security?

Continue Reading

March 28, 2022

.NET 5.0 Will Reach End of Support in May

For organizations using .NET 5.0, you'd better take note of Microsoft's recent announcement. .NET 5.0 will reach end of support on May 8, and after the .NET May 2022 updates, Microsoft will no longer provide updates including security fixes or technical support for this version. 

Continue Reading

March 11, 2022

The Importance of an Upfront Cybersecurity Policy Framework

Organizations are in a hurry to mature their cybersecurity programs. Whether it is world events, prior incidents, or just the desire to be security conscious that is driving these efforts, there is one thing that makes these efforts less complicated along the journey – develop your cybersecurity policy framework first.

Continue Reading

February 24, 2022

Conflict over Ukraine is raising cyber risk for US organizations. What should you do to prepare?

As the world watches Russia's conflict with Ukraine, US services providers, like OneNeck, operating critical infrastructure are watching closely as cyberattacks could accompany any physical conflict. The FBI, CISA and the National Security Agency put out a joint advisory in January about potential cyberthreats against US critical infrastructure. CISA also warned US companies to protect their IT systems against destructive wiper malware, which has been used against targets in Ukraine. 

Continue Reading

February 22, 2022

Ransomware is still topping the security threat list, especially in healthcare.

Ransomware continues to be the top threat to today's organizations, with healthcare topping the list of verticals most at risk, putting millions of patient's personal and financial data at risk, according to a recent threat summary report from Cisco Talos. Additionally, healthcare facilities are uniquely affected when breached, as it's not just dollars lost as with manufacturing or enterprise - lives are potentially at stake.

Continue Reading

February 21, 2022

Embracing the Modern Workplace in Your Business

People are a business's most important asset. However, it's harder than ever to attract and retain top talent in today's labor market. The market favors employees, and people aren't willing to put up with toxic environments or stagnating companies. Thus, businesses need to create a workplace that keeps employees happy and engaged. So, what do people want?

Continue Reading

February 14, 2022

Benefits of a 30-day Patching Cycle

Maintaining your organization's security is an ongoing process that never ends. With security threat constantly evolving, your defenses have to evolve too. That’s why many organizations choose to work with a managed service provider like OneNeck, which offers technology expertise at a scalable cost and built-in security processes that keep customers safe from attack.

Continue Reading

February 7, 2022

The Fundamentals of Backup and Disaster Recovery

How would you like to pay your employees to do nothing? Paying people for nothing is not likely in your business plan. But without sufficient preparation, that’s exactly what many companies do when faced with a disaster or an outage. Systems go down for hours, days, or even weeks, and operations get shut down.

Continue Reading

January 28, 2022

5 Ways Microsoft Azure Can Upgrade Your Business

Gartner expects end-user spending on public cloud services to grow 23.1% in 2021 to total $332.3 billion. This growth is why more companies are moving essential business processes to the cloud. And as mobile, web, and desktop applications become increasingly crucial to everyday operations and customer experience, growth will continue. How should businesses respond?

Continue Reading

January 11, 2022

Understanding Microsoft's New Commerce Experience Auto-renewals, Grace Periods and Scheduling Changes

First of all, what is the New Commerce Experience?  Microsoft has many licensing programs that often contradict, overlap and confuse the entire industry, and they recently launched a New Customer Experience platform that enables them to sell products under fewer, more aligned programs.  Their goal is to help customers be more flexible, move faster and, ultimately, provide greater value.  The end vision is that customers will buy through the Microsoft website, through a Microsoft sales rep, or ...

Continue Reading

January 6, 2022

How to Mitigate the Negative Effects of Shadow IT

Your company may fear shadow IT because it limits its visibility into the applications on your network. Many organizations take the easiest path, which is to ban the use of any unapproved applications. However, this strategy may prove ineffective and even limit the productivity of your people.

Continue Reading

December 10, 2021

Zero-day Vulnerability for the Apache Log4j Java Library

There is a new zero-day vulnerability for the Apache Log4j Java library, and it is being actively attacked right now. The bug, now tracked as CVE-2021-44228 and dubbed Log4Shell or LogJam, is an unauthenticated RCE vulnerability allowing complete system takeover on systems with Log4j 2.0-beta9 up to 2.14.1. There are many applications this can and will affect, from a variety of open source projects to vendor supplied solutions.  

Continue Reading

December 6, 2021

Azure Synapse Database Templates

Microsoft Azure Synapse Analytics is one of Azure’s primary data services, tasked with analytics and data warehousing. In fact, it is a rebranding of Azure SQL Data warehouse.

Continue Reading

November 24, 2021

Stay Safe from Cyberattacks this Holiday Season

It’s that time of year, where twinkling lights and Santa’s sleigh full of toys are everywhere. But with all the holiday bustle comes additional risk, the risk of mounting security threats as shoppers are eagerly swiping their credit cards while checking gifts off their lists. What does this mean for today’s organization, where the line between corporate and personal devices is blurrier than ever before?

Continue Reading

November 23, 2021

7 Benefits Microsoft Azure can Bring to Your Business

Businesses today face daunting technological challenges. Customers expect uninterrupted service from anywhere and want it faster than ever. However, delivering digital applications and services requires immense amounts of computing resources, especially if they’re being delivered globally.

Continue Reading

November 17, 2021

Microsoft 365 and SPLA Price Changes: What you need to know...

Microsoft has announced their first price increase for Office 365 and Microsoft 365 services in a decade. These price increases will go into effect in early 2022. Here's what's coming...

Continue Reading

November 8, 2021

Simplify Your Computing With Hyperconverged Infrastructure

Scalability, flexibility and cost-efficiency are all hallmarks of a high-performing data center. However, with scale comes certain challenges. For example, organizations must decide which network architecture will best suit their business needs. Cloud computing offers many advantages for those who want to scale but can be expensive and fall short in the security department. 

Continue Reading

October 29, 2021

WordPress Plugin Bug Lets Subscribers Wipe Sites

A high-severity security flaw found in a WordPress plugin that has 8,000+ active installs can allow authenticated attackers to reset and wipe vulnerable websites.

Continue Reading

October 26, 2021

How Can You Use Digital Transformation To Keep Pace With Technological Progress?

Digital transformation has given businesses across many industries a competitive advantage. While gaining an advantage is compelling, it’s not the only reason to embrace digital transformation. When you consider how quickly technology is evolving, digital transformation is no longer optional. Those who don’t familiarize themselves with the process will fall behind.

Continue Reading

October 25, 2021

NOBELIUM is Targeting IT Service Providers. Here’s What You Need to Know.

Today the Microsoft Threat Intelligence Center (MSTIC) released a statement regarding the threat actor, NOBELIUM, who launched a campaign against cloud service providers (CSPs), managed service providers (MSPs) and other IT services organizations. By targeting IT providers, they are attempting to gain access to privileged customer accounts so they may move laterally throughout the cloud environment and gain access to downstream customers and systems.

Continue Reading

October 7, 2021

Apache HTTP Server 2.4.49 Vulnerability

Two days ago, The Apache Foundation disclosed a path traversal and file disclosure flaw in Apache HTTP Server 2.4.49 (an open-source web server for Unix and Windows that is among the most widely used web servers), tracked as CVE-2021-41773, as actively being exploited in the wild. The advisory does not indicate when exploitation of CVE-2021-41773 was detected, but the exploitation drove the expedited release of a patch by Apache.

Continue Reading

October 2, 2021

3 Reasons to Get Excited About Next-gen HCI

The uptake of hyperconverged infrastructure (HCI) over the last decade has been strong, for good reasons: the technology is simple to manage and makes it easier to administer virtual desktops, apps and data. Businesses enjoy being able to scale infrastructure performance and storage capacity easily, by just slotting in a new node.

Continue Reading

September 29, 2021

VMware’s Recent Announcement on ESXi Boot Devices

VMware recently released an article titled Removal of SD card/USB as a standalone boot device option, where they announced a new stance on ESXi boot devices. The article states that starting with the next release of ESXi (soon to be announced), SD cards and USB devices will not be supported as boot devices. They will require another local persistent device with a minimum of 32GB, but 128GB is recommended, for boot devices.

Continue Reading

September 17, 2021

The Pros and Cons of Data Center Colocation

The rise of data center colocation has added a third option for businesses thinking of expanding their cloud or on-premise infrastructure. Now organizations can expand their computing infrastructure without increasing their real estate.

Continue Reading

September 10, 2021

How Can Hybrid IT Benefit Your Organization?

Agility is a major concern for modern businesses, especially those in the technology sector. Being slow to act can result in missed opportunities, performance drops and lower earnings reports. Hybrid IT helps technology-based organizations stay agile by combining private IT infrastructure with cloud-based services. 

Continue Reading

September 8, 2021

The Future of Healthcare in the Cloud - Hybrid Cloud

Healthcare is undergoing a radical transformation. In response to the pandemic, IT teams have had to accelerate digital transformations, greatly expand telemedicine, support an increasingly remote workforce, and cope with an increasing number of Internet of Medical Things (IMT) devices - all while ensuring that their systems and data remain secured. To move so quickly, many organizations have embraced hybrid cloud.  

Continue Reading

July 7, 2021

Better Together in the Nutanix Service Provider Program

You may have heard that Nutanix recently launched the Nutanix Elevate Service Provider Program, which OneNeck was excited to be a part of. This gives us the opportunity to expand and differentiate our managed cloud services to our customers and deliver even more value that accelerates our customers’ growth.

Continue Reading

July 2, 2021

Windows Print Spooler Vulnerability (aka “PrintNightmare” Zero Day)

 The PrintNightmare Zero Day vulnerability allows attackers with a local presence on a device to execute malicious code that exploits the flaw in the Windows Print Spooler service, granting SYSTEM access. Specifically, an attacker can exploit the vulnerability by placing the exploit DLL in a subdirectory under  "C:\Windows\System32\spool\drivers". Microsoft notification for this vulnerability can be found here: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527  

Continue Reading

June 17, 2021

Managing Shadow IT

No doubt about it — if your company has employees, you have shadow IT. According to a survey conducted by Stratecast and Frost & Sullivan, 80% of employees say they use applications on the job that aren’t approved by IT.

Continue Reading

June 9, 2021

3 Tips to Manage Cloud Spend in Your Enterprise

According to Flexera’s State of Cloud 2021 report, organizations are continuing to rapidly increase their cloud spend. In so doing, they struggle to accurately forecast their fast-growing cloud costs.

Continue Reading

March 25, 2021

OneNeck Named to the RCPmag.com Top 350 Microsoft Partner List

As a uniquely positioned group of Microsoft experts, the Redmond Channel Partner team advocates for Microsoft partners, offering advice on growing their Microsoft services and building productive partnerships. So, their recent recognition of OneNeck in their top 350 US Microsoft partners was evidence of OneNeck’s continued commitment to our partnership with Microsoft and growing our Microsoft portfolio of services.

Continue Reading

March 5, 2021

Still Confused About Microsoft's Product Names? | O365 vs M365

From time to time, we still get questions related to Microsoft’s continuing effort to clarify product offerings and make it easier to use Microsoft Online Services such as Office/Microsoft 365. To do this, last year Microsoft made multiple product name changes to be more reflective of the range of features and benefits in the subscription. So, I thought I'd recap for those still wondering, "Is it O or M?"

Continue Reading

March 4, 2021

CVE-2021-26855 - Microsoft Exchange Server Remote Code Execution Vulnerability

Over the last couple of days, Microsoft released out-of-band security updates to address multiple vulnerabilities in Microsoft Exchange that could allow an unauthenticated, remote attacker to exploit an Exchange Server by sending a specially crafted HTTP request over port 443 allowing the attacker to authenticate.

Continue Reading

February 3, 2021

Is Your Data Holding You Back?

The stats are crazy. There are roughly 3.7 billion humans using the Internet, with 5.6 billion Google searches every single day! Data is the center of our lives, personal and business, leading to roughly 2.5 quintillion bytes of data being generated every single day – and that number just continues to grow. But not unlike water, so pivotal in our existence, too much of a good thing can lead to drowning.

Continue Reading

January 21, 2021

Containers vs Virtual Machines: Which Is Best?

Containers are quickly becoming commonplace in workplace applications, even replacing virtual machines in some instances. But how do you know if containers are right for your IT environment?

Continue Reading

January 14, 2021

Microsoft Teams Adoption Strategy

Microsoft Teams is the Hub for teamwork in Microsoft 365. To maximize Microsoft 365 investments, it’s important to plan for a successful deployment and adoption. Planning to ensure that users adopt new services and embrace those services and use them as part of their natural rhythm of work is critical to Teams success.

Continue Reading

January 7, 2021

What Is DevOps and Why Do You Need It?

Today’s fast-paced world makes DevOps essential to all enterprises seeking to respond rapidly to changes in customer demands, market conditions and competitive pressures. But, what is DevOps and how do you get started? What tools do you need to leverage? How do you bring all the right technologies together successfully?

Continue Reading

December 17, 2020

FireEye Red Team Tools Breach – Yet Another Example that No One’s Safe.

Data breaches are everywhere, and everyone is susceptible – even the security experts. This was recently put front and center by the state-sponsored adversary that stole FireEye’s Red Team tools.

Continue Reading

December 16, 2020

OneNeck's Response to the FireEye Breach

Specific to the FireEye breach which identified a widespread compromise of Solarwinds software, OneNeck continues to ensure we are following security industry and vendor recommendations for securing our environment specific to any of the Common Vulnerabilities and Exposures (CVE) and any Indicators of Compromise’s (IoC) that become known to be associated with these breaches.  The CVEs specifically associated with these breaches have documented solutions from the appropriate vendors that have ...

Continue Reading

November 16, 2020

Microsoft Combines and Renames Products Under Microsoft Defender Brand

“What's in a name? That which we call a rose by any other name would smell as sweet.” True, Juliet, but a name does matter, especially when it’s simply arbitrary versus describing what it actually is. And this seems to be a truth that Microsoft has taken to heart…

Continue Reading

October 27, 2020

How to Overcome IT Outsourcing Challenges

Nowadays, many organizations eagerly use IT outsourcing to remediate IT skills shortages, control cost and gain access to world-class capabilities. Statistics show that the market size of the outsourcing industry in the US in 2020 is $132.9 billion and it is going to grow by 1.6% the same year. And while this approach has many benefits, it is not without challenges. 

Continue Reading

October 20, 2020

Why You Should Consider a Managed Backup Service

For any modern organization, protecting business-critical data is vital. Yet protecting data assets has become complex and difficult as the rising tide of data grows in double to even triple digits compounding year over year.

Continue Reading

October 15, 2020

Estimating WAN Latency Calculator

As services move into the cloud, more vendors are publishing the latency requirements for their platform or application. These requirements could specify a maximum latency among computing nodes in a cluster, between a computing node and a storage array, or for an application-specific data flow like vMotion. Being able to estimate network latency between locations will help you identify which connectivity options are viable solutions. The following are some items to consider when estimating ...

Continue Reading

September 24, 2020

Patch Now... Your Windows version of Cisco Jabber could be a security risk

On September 2nd, 2020, Cisco issued a Critical Security Advisory announcement regarding Cisco’s Jabber for Windows that customers should be aware of. A vulnerability in Cisco Jabber for Windows could allow an authenticated, remote attackers to execute arbitrary code. Attackers could achieve remote code execution by sending specially crafted chat messages.

Continue Reading

September 17, 2020

Is Your Citrix StoreFront Vulnerable to Exploit?

On September 14, Citrix pushed out an announcement around a high-severity security vulnerability Citrix StoreFront customers should be aware of. An issue has been discovered in Citrix StoreFront (before 2006) that, if exploited, would allow an attacker who is authenticated on the same Microsoft Active Directory domain as a Citrix StoreFront server to read arbitrary files from that server.

Continue Reading

August 31, 2020

Are You Doing What You Can to Protect Your Backups from Ransomware?

Ransomware is at our doorstep. We cannot ignore it any longer or think we are not a target. In recent years at OneNeck, we have seen a significant upward trend of ransomware attacks. And even more troubling is in the last year, we have seen bad actors getting smarter, and they are now targeting your backup server and backup data to prevent you from recovering from the attack. As ZDNet stated, "The number of ransomware strains targeting NAS and backup storage devices is growing, with users ...

Continue Reading

August 18, 2020

Digging Deep into the Dark Web for User Credentials

We’ve all heard of the dark web, but most law-abiding people don’t give it much thought, as we chalk it up to the place shady people go to do shady things. But the truth is that today’s data-driven organizations can no longer ignore the dark web and the possibility that their customer and employee data could be out there with a for-sale sign.

Continue Reading

August 4, 2020

Is it Time to Put Your Office 2013 Out to Pasture?

If you’re one of the organizations that are still using Office 2013 with Microsoft Online Services, then you'll want to know the changes coming this fall.  Microsoft recently announced the following updates…

Continue Reading

July 28, 2020

Anatomy of Ransomware

Ransomware is a type of malware that threat actors use to infect computers and encrypt computer files until a ransom is paid. After the initial infection, ransomware will attempt to spread to as many connected systems as possible, including  file systems and other accessible systems on a business’s network.

Continue Reading

July 8, 2020

The New Normal Makes Work an Activity, Not a Place

Recent months have seen a massive shift towards supporting remote workers, which in turn has created a series of security challenges. IT teams are now not only tasked with quickly providing support for a never-before-seen number of offsite workers and their devices, but they must do it without compromising security – no small task.

Continue Reading

May 22, 2020

Now’s the Time to Put Digital Transformation Initiatives into Hyperdrive

Digital transformation (DX) is not a new initiative. In fact, Forbes states that 70% of companies had a DX initiative in place at the onset of the pandemic but weren’t far enough along to make the crisis a non-issue. As a result of the past couple months where digital has become central to every interaction, DX is back in the forefront for IT leaders.

Continue Reading

May 6, 2020

Hug Your Cloud.
On-Prem Cloud Has Its Place.

Many enterprises are amid a digital transformation, seeking to engage with customers and satisfy their needs through digital technologies.  Many are looking up to the clouds to enable this agility, scalability, and simplicity—but no two models are created equal. And because businesses cannot afford to sacrifice control and security, going all-in on a public cloud only approach isn’t always feasible. To deliver on the promise of digital transformation, you need a unified infrastructure that ...

Continue Reading

April 24, 2020

Do You Know Who’s Responsible for Your Office 365 Data?

No doubt about it, for Microsoft Office 365 (O365), business is booming. At their Q3 FY19 earnings call, Microsoft CEO Satya Nadella said that Office 365 is now used by 180 million monthly active users and growing at more than 4 million users per month – and that was before the recent surge in the demand in collaboration tools!

Continue Reading

April 21, 2020

Microsoft Renames the Office 365 SMB SKUs

As Esther Dyson so eloquently put it, “Change means that what was before wasn’t perfect.” And as we all know in technology, change is a given. Today brings more change. As of today, Microsoft is changing the names of Office 365 SMB SKUs and making way for Microsoft 365.

Continue Reading

April 9, 2020

Collaboration in the Time of COVID-19

Due to the spread of COVID-19 coronavirus, remote work became an overnight requirement for many. Few organizations feel prepared for large-scale remote work, but collaboration tools can help you navigate these unpredictable situations.  

Continue Reading

April 1, 2020

New Microsoft 365 Firstline (F-) SKUs

On March 19, 2020, Microsoft announced a new Microsoft 365 plan designed specifically for Firstline Workers. The offer helps organizations connect their Firstline Workers with the rest of the company and close long-standing technology gaps that often separate these workers from secure apps and services that enable continuous productivity, simplify communication and support greater self-service.

Continue Reading

March 31, 2020

Considerations when Securing a Remote Workforce

As today’s IT teams are scrambling to figure out the logistics of helping their coworkers be productive from their home offices, it’s important to remember that security can’t be an afterthought. Enabling employees to work remote has only broadened the landscape for attackers, giving them even more opportunity to find a way into your organization.

Continue Reading

March 20, 2020

A Remote Workforce Powered by Partners Who Care

We’re living in a very strange and uncertain time - uncharted waters one could say. Sequestered in the relative safety of our homes, unsure of what next week or even tomorrow might bring, business must still go on. But while we may be working in isolation, it’s still people that power the modern business. And in any business, the team is paramount. It’s where creativity, collaboration, and solutions all come together within a group to exceed the sum of its parts.

Continue Reading

February 14, 2020

What are the Top Hybrid Cloud Advantages for Business?

There’s no doubt that everyone is full-on in love with the cloud these days, and for many good reasons. The cloud has treated us well and continues to give us many reasons to continue to embrace it. However, there still a common misconception due to the nebulous nature of it, especially when it comes to hybrid cloud architectures and the advantages they have over public or private clouds.

Continue Reading

February 13, 2020

3 Benefits to Adopting a Multi-Cloud Strategy

You want performance, you want reliability, you want flexibility, and you want it all tied together with your organization’s unique needs in mind. You know that a multi-cloud strategy is essential to your organization’s digital transformation, but where do you start?

Continue Reading

January 17, 2020

A Brand that Goes Beyond Technology

By now, you’ve heard them all… “We have the brightest minds in the business.” “You need our expertise.” “Our bench has the most certifications in the industry.” …none of which mean anything in the context of the day-to-day to-do list that any given IT department faces. Which is why, in an attempt to get real, we’ve launched a different approach to the OneNeck brand.

Continue Reading

December 30, 2019

Planning and Developing a Hybrid Cloud Strategy

Hybrid Cloud solutions have proven to be a highly effective, flexible and scalable hybrid IT strategy for businesses of all sizes across a wide variety of industries.  But an expert strategy is needed to ensure the safety of mission-critical data. Partner with OneNeck to launch your business higher.

Continue Reading

December 23, 2019

Alas, the perimeter is gone. Is it time for an updated firewall?

Long ago, in a land far away, there used to be a network perimeter. Those were the good old days where the network perimeter was the all-encompassing traffic control point, and where traffic was all funneled through a single point, no matter where it came from. But the cloud changed everything by decentralizing the network, making the perimeter vaporize, and giving IT many a sleepless night.

Continue Reading

November 12, 2019

Azure Reserved Instances

If it’s been a while since you have looked at Azure Reserved instances, now is a great time to revisit them. Not sure what Reserved Instances are for? Read on, you may just save some money.

Continue Reading

November 6, 2019

How Much Risk is Too Much?

For a long time, security initiatives have been driven by compliance mandates and a healthy dose of fear. But as threats continue to become more sophisticated, so must our efforts in thwarting them. This is why aligning with best practices is a great place to start, specifically the Center for Internet Security (CIS) Top 20 Critical Security Controls which was developed by a global group of security experts who continue to finetune them every year.

Continue Reading

October 29, 2019

Choosing an IT Vendor Without Your Crystal Ball

Does selecting an IT vendor and deciding on the right direction for your company seem to get more complex with every conversation? Without a crystal ball to reveal precisely which vendor is a perfect fit, knowing you’re making the right decision is virtually impossible—but it doesn’t have to be.

Continue Reading

October 23, 2019

When it comes to avoiding risk, what is OneNeck doing?

Security is intrinsic to our services (for all customers) and organization (all the way to the president and CEO of our parent company TDS Inc.). It’s part of every service we develop—from start to finish. Additionally, we leverage the Critical Security Controls (CSC), outlined by the Center for Internet Security (CIS), to complete our annual security assessments and third party audits. The Critical Security Controls provide a series of cybersecurity actions prioritized by their criticality in ...

Continue Reading

October 16, 2019

Avoid Issues with Microsoft Windows Server 2008 and SQL Server 2008 Upgrade or Migration to the Cloud

Have you upgraded or migrated your server to the cloud yet? With SQL Server 2008 support having ended in July 2019 and Windows Server 2008/R2 support ending in January 2020, if you haven’t, now is the time to upgrade or migrate your workloads to the cloud.

Continue Reading

October 15, 2019

OneNeck Named an Environmental Leader in Colorado

In a recent statement, the Colorado Department of Public Health & Environment recognized OneNeck IT Solutions, and its data center in Denver, Colorado, as an environmental leader in the state. On October 1, the Colorado Department of Public Health and Environment’s Environmental Leadership Program recognized more than 170 businesses—including OneNeck—for their the voluntary and significant environmental achievements. “Having our data center named an environmental leader is an important ...

Continue Reading

October 10, 2019

How to Determine the Best-fit Venue for Workloads

If there’s anything that can be said about today’s IT environment, it’s that choice abounds, which is why we find ourselves smack dab in the middle of this hybrid reality in which we now exist.

Continue Reading

October 8, 2019

Notes from Oracle Open World 2019

This year #OOW19 and #CodeOne had a different color and feel, with lots of exciting announcements from Larry.

Continue Reading

October 1, 2019

Containers 101 – Here’s What You Need to Know

Although containers aren’t new (been built into Linux for 10+ years and been available in FreeBSD, AIX and Solaris), containers seem to be all the rage, and for good reason. The agility containers can bring to an IT team alone make them appealing, but add in the security benefits that the self-contained nature of containers brings, they seem like a no brainer. But even with numerous benefits, there is also a lot of confusion about what they really are and what is the best-fit scenario. So, we ...

Continue Reading

September 24, 2019

The Modern IT Partner – Bringing Value through Optimization Services

Is your business racing to keep up and redefine yourself? It’s a situation most businesses face as they strive to remain relevant in today’s digital economy. And, they count on their IT provider to do the same. At OneNeck, we are steadfast in our commitment to evolving our delivery capabilities and solutions to align with customers’ growing demands.

Continue Reading

September 19, 2019

HCI - Driving Real Business Results in a Time of Rapid Change

All businesses have to transform and adapt to do business in an increasingly digital world. But to transform, they must first address the foundation that their business sits on, making converged infrastructure (CI) and hyperconverged infrastructure (HCI) a great fit that enables efficiency and scalability on validated infrastructure. 

Continue Reading

September 17, 2019

The Ins and Outs of Cloud Backup vs NAS

When it comes to selecting the best backup—NAS (network-attached storage) or cloud-based—there are a multitude of factors IT leaders must consider. To break it down, a recent TechTarget article written by John Edwards highlights the pros and cons of the two approaches, and includes insights on which backup technology might be the best choice.

Continue Reading

August 27, 2019

Components of a Successful Security Practice

In its simplest form, compliance is about setting rules and following them, every time. No wavering, no audible—everyone simply follows the rules—every time. Seems easy, but it’s not always.

Continue Reading

August 14, 2019

6 Ways to Relieve "Security Fatigue"

Do you ever feel that your non-IT co-workers are trying to thwart your security protocols – ignoring software update alerts, opening suspicious emails or not following password best practices? If it seems that way, it might be “security fatigue.”

Continue Reading

August 6, 2019

How Setting Up and Running a Cloud-Based IT Environment is Different for the Small to Mid-Size Business

When it comes to setting up and running a cloud-based IT environment, businesses of all sizes (including small and mid-sized companies) can benefit from leveraging a hyperscale cloud. 

Continue Reading

July 30, 2019

Office 365 Backup

I need backup for Office 365? Isn’t it already included?  In short, no. The misconception that Microsoft fully backs up your data on your behalf is all too common.  To the contrary, Microsoft is primarily focused on managing the infrastructure and ensuring uptime; you are responsible for your data.

Continue Reading

June 18, 2019

Wi-Fi 6 is here. Now what?

There’s no denying it – the wireless network is the primary way we connect to the digital world. In fact, it’s so big, that traffic from wireless and mobile devices will account for 71% of total IP traffic by 2022, according to Cisco's Forecast and Trends for 2017-2022. But behind that wireless network is a mesh of complex technology, which to the general layman can be quite confusing.

Continue Reading

June 18, 2019

Understanding Software-Defined WAN

Bandwidth needs are skyrocketing. To meet the growing demand, there is a transition underfoot to move away from traditional the wide area network (WAN) to the software-defined wide area network (SD-WAN). According to IDC, SD-WAN technology is projected to exceed $6 billion in revenue by 2020. SD-WAN promises great change, and adoption is gaining traction, but understanding how you can deploy it to benefit your organization is still evolving for many organizations.

Continue Reading

June 6, 2019

Enhance Security with an Analytics-Driven SIEM

 Finding a mechanism to collect, store and analyze security only data is relatively simple. There is no shortage of options for storing data. Collecting all security relevant data and turning all that data into actionable intelligence, however, is a whole other matter.

Continue Reading

June 4, 2019

Creating a strong external security posture is critical

Creating a strong external security posture is critical. But what can businesses do to protect their data and environments?

Continue Reading

May 29, 2019

How Much Does the Public Cloud Cost? Answer These Four Questions to Find Out.

When it comes to moving to the cloud, businesses of all sizes are feeling the pressure. On one hand, the capabilities offered by the cloud are too good to ignore. If you don’t take advantage of the cloud’s flexibility and scalability—and its ability to support artificial intelligence, automation, real-time business analytics and more—you can bet that your competitors will. A Cloud Vision 2020 survey estimates that by the year 2020, 83% of the enterprise workload will be in the cloud—with almost ...

Continue Reading

May 23, 2019

Is it Time to Move Your ERP to the Cloud?

There are many considerations when moving to the cloud, and with large, complex ERP applications, there is even more to consider. We recently sat down with Scott Morley, one of OneNeck's ERP and cloud experts, to get his thoughts on the matter...

Continue Reading

May 20, 2019

Evolving Expectations for NMS

The landscape for Network Managed Services (NMS) providers continues to become more challenging, especially as application, management and compliance requirements keep evolving. Proactive support is a core component. At the same time, IT budgets for small- and medium-sized businesses keep shrinking while there is heightened focus on finding ways to squeeze more productivity out of limited resources.

Continue Reading

May 16, 2019

Older Windows Systems Beware of New Vulnerability

Are you running an older version of Windows and not current with your patch management? If so, you need to be aware of a recent exploitable vulnerability that just hit the news this week. Here's what you need to know...

Continue Reading

May 16, 2019

Security vs Compliance ... is there truly a difference?

It’s no secret... security attacks are the rise:

Continue Reading

May 14, 2019

The Re-emergence of SDN

Software Defined Networking (SDN) has been around for almost two decades. The concept was extraordinary and innovative then, but could be considered less-so in 2018. While the excitement surrounding this concept has aged a bit, real-world benefits and outcomes are emerging and bringing renewed interest.

Continue Reading

May 9, 2019

Multi-Factor Authentication Explained

TeleSign research indicates that the majority of users use five or fewer passwords for all of their accounts. While it may seem efficient for password memory on your end, you could actually create a “domino effect” that allows hackers to take down multiple accounts by cracking one password.

Continue Reading

April 30, 2019

The Ingredients of a Well-Architected Cloud

There are a lot of opinions to be had about what goes into a solidly-architected cloud. But with so many considerations around reliability, performance and security, too many options can get overwhelming. So, I thought I’d ask one of our resident cloud experts, Derek DeHaan, and get his thoughts on the matter…

Continue Reading

April 24, 2019

APM vs. NPM - What's the Difference?

Two terms that get thrown around a lot in our industry are APM and NPM, and it seems they are often interchanged (or confused). So, what is the difference between APM (Application Performance Monitoring) and NPM (Network Performance Monitoring)?

Continue Reading