<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=381391698926062&amp;ev=PageView&amp;noscript=1">
//mega nav ctas

OneNeck Blog

Part of being a thought leader is sharing our expertise and ideas about both important and urgent IT issues with the world. In addition to contributing to this blog, OneNeck® IT Solutions’ subject matter experts also receive invitations to speak at conferences and write articles for leading trade journals

April 24, 2019 | Cloud & Hosting Solutions

APM vs. NPM - What's the Difference?

Two terms that get thrown around a lot in our industry are APM and NPM, and it seems they are often interchanged (or confused). So, what is the difference between APM (Application Performance Monitoring) and NPM (Network Performance Monitoring)?

April 18, 2019 | Cloud

Disaster Recovery, A Primer for CIO's

How can a CIO be confident that IT will perform 24/7/365?  According to Zerto, in today’s always-on, information-driven organizations, IT resilience depends completely on IT infrastructures that are up and running 24/7. The costs of downtime are...

March 26, 2019 | Security

Credential Stuffing - What it is and How to Protect the Enterprise

Credential stuffing is a type of cyber-attack where hackers take combinations of usernames and passwords leaked from other sites and use them to gain access to accounts on another site.  F5 states that there’s typically a 1 to 2 percent success...

March 19, 2019 | Digital Transformation

Thrive vs. Survive the Data Onslaught

The importance of data in not only business but our day-to-day lives continues to grow – no one is arguing that. But the pace at which it’s growing is mind-blowing. In a recent study sponsored by Seagate Technology, IDC forecasted that the global...

March 05, 2019 | Security

Anticipate 2019's Cybersecurity Threats Without a Crystal Ball

In Cisco’s February 2019 Threat Report, their cybersecurity experts analyzed prominent threats of the past year for clues to new attack strategies and targets. As they put it, “It's as close as we can get to anticipating future trends without a...

February 26, 2019 | Security

Blockchain: A Revolution in the Cloud for IT Security

Antiquated is not a word commonly associated with the advanced worldwide network of client-server configurations that make up modern data transmission. However, advances in data storage, file sharing and security protocols have struggled to keep...

February 14, 2019 | Managed Services

Is it Time to Show Your Applications Some Love?

As a consumer, we utilize applications on a daily basis. How many times have you found yourself asking, “There’s got to be an app for that?” It’s quite simply the expectation in today’s app-centric world. And when an app doesn’t function the way...

February 07, 2019 | Digital Transformation

Do You Have a Digital Mindset?

 It's no secret… when you increase collaboration, you improve productivity and employee engagement. But how you do enable a digital workplace?

January 29, 2019 | Security

Advances in Cybercrime Demand Greater Protection

A look at retrospective security versus point-in-time solutions With cybercrime predicted to reach $6 trillion annually by 2021 and to be more profitable—and therefore, more attractive to criminal organizations—than the global combined trade of...

January 22, 2019 | Security

Prepare for Windows Server 2008 and 2008 R2 End of Support

Extended support for Windows Server 2008 and 2008 R2 is coming to an end respectively on January 14, 2020 What does end of support mean for Windows Server 2008 & 2008 R2?