Penetration Tests and Their Benefits

Penetration tests and their benefits on the brain? If performed regularly, penetration tests are key to your overall security posture. It’s an important practice that gives organizations visibility into real-world threats to your security. As part of a routine security check, penetration tests allow you to find the gaps in your security before a hacker … Read more

Strategies for Mitigating Cyber Intrusions

Strategies for Mitigating Cyber Intrusions Cyber intrusions worrying you? Looking for some basic strategies that your IT team can use to mitigate cyber intrusions? Here are four tips, courtesy of the Australian government. As part of its mission, the Australian Signals Directorate, an Australian government intelligence agency, provides advice and assistance on information and communications … Read more

Universities That Have Deployed Microsoft Azure

Universities That Have Deployed Microsoft Azure

Should you join the other 750 universities that have deployed Microsoft Azure? The answer is a definite yes. Azure is a complete cloud platform with data centers located across the globe with capabilities that support a broad range of scenarios in the classroom and research settings. As more and more college classes are being taken … Read more

Azure Storage Bridges the Gap

Azure Storage Bridges the Gap Between Your Budget and Your Needs Azure Storage is a common interest for those exploring the benefits of Azure Managed Services, so let’s look further. Cloud backup and recovery options, such as those running on Microsoft Azure’s cloud platform, can help bridge the gap between your budget and your needs. … Read more

Cost of Downtime

Cost of Downtime

Cost of Downtime Ever calculate the cost of downtime? A major new survey by Veeam Software did, and the results reveal that there’s far more to system downtime than the bracing hard costs. In its fifth annual “Availability Report,” Veeam interviewed 1,140 senior IT staff in 24 countries, including 150 U.S. folks.  All of the … Read more

Azure’s Growth Is Explosive

Azure’s Growth Is Explosive   This week marks the annual Microsoft Cloud and Hosting Summit, and I must say they’ve started off with a bang — beginning with an initial session today that revealed just how explosive Azure’s growth has been. With Azure and AWS currently running neck and neck in the public cloud space, … Read more

When Hackers Strike

When Hackers Strike “The battle against terrorism is not only a military battle, but primarily a battle of information” -Ahmed Chalabi   In today’s globalized and cyber-connected world, hackers are a real and present danger. The threat of “bad guys” extends to the Internet and the security of your life and personal information. Throughout history, … Read more

Creating a Compliance Culture

Wondering how to create a positive compliance culture within your company?  We’re here to help companies make managing compliance, well, manageable. We’ve defined the role and responsibilities of the Chief Compliance Officer. We’ve helped delineate what a Compliance Management System (CMS) is all about. We are now here to share the next best kept industry … Read more

Hurricane Preparedness: Protect Your Data

Hurricane preparedness should always be top of mind at this time of the year. While those of us living in the Commonwealth of Virginia narrowly missed getting walloped by Hurricane Joaquin this month, folks in the Carolinas were not so fortunate. They were inundated with rain, resulting in damaging floods.  Businesses and governments were forced … Read more

PCI DSS Requirements 3 and 4

Questions about PCI DSS Requirements 3 and 4? You’ve come to the right place. As you may know, AISN is a PCI compliant cloud hosting provider. Previously, we addressed questions about PCI DSS Requirements 1 and 2. Today, we’re reprinting highlights from an exclusive online interview sponsored by our valued partner, KirkpatrickPrice. In this interview, … Read more