What to Consider When Outsourcing Your IT Needs

The idea of outsourcing your company’s IT needs often arises during a period of growth or other type of transition. This is proven when we look at the most commonly outsourced tasks, which include software development, infrastructure and security support (Tier 1,2 & 3) & monitoring, and migrations to new technologies or platforms. In the […]
Why the Log4j Vulnerability Is Different and What Can Be Done

If you’re in the IT field, you’ve probably heard of the Log4J exploit. Log4j is, simply put, the biggest and most widespread software vulnerability in history. The ease with which a user can exploit the vulnerability is unprecedented, and Apache-based web servers – which contain a chunk of code called Log4j – are everywhere. Software […]