Cyber Attacks Part II – New Distribution Strategies by Hackers

Hackers are using a new channel of attack for penetrating networks.  A malware threat previously used in direct attacks against energy sector companies is now being aimed at organizations that use or develop industrial applications and machines.  This strategy introduces malware into systems that are then connected into target networks. In early 2014 attackers began distributing new versions...

Read More

Business System Complexities and What To Do About It

Business System Complexities and What To Do About It Business systems are complex, only becoming more complex, and as such the management of the associated identities has spiraled out-of-control for many Enterprise organizations.  Additionally, it is increasingly more challenging to protect the type of devices that access Enterprise data.  Over the years, this has culminated in business unit...

Read More

Four More Considerations for Your Next Deployment

I recently wrote a post about considerations for an international deployment – key items that need to be planned for or mitigated to avoid trouble down the road. To follow up on that post, I wanted to discuss some additional items that aren’t necessarily specific to an international deployment, but really are more relevant for any migration, large or small, local or global.…

Read More

Notes from the CRONET Team

The evolution of massively scalable, multi-faceted, cloud based infrastructure solutions (think Amazon Web Services, Microsoft Azure, and others), has enabled an unprecedented amount of functionality to our clients. Even better, these solutions come at a cost structure unheard of even just a few years ago. Their ease of provisioning and deployment and their extremely low barrier to entry...

Read More

Automated Tragedy

A couple years back, an HP engineer at CommBank in Australia managed to format some 9,000 workstations using Microsoft’s System Center Configuration Manager. The problem is…they weren’t trying to. Turns out that an operating system deployment task sequence was inadvertently advertised to nearly every computer in the environment, meaning those machines, whether they needed...

Read More

Financial Services Salesforce.com Solutions: Pricing Desk in the Cloud

In a previous blog, “Customizing Salesforce.com for Better Business Results,” I described a customized Salesforce solution configured for a financial services organization to help realize the greatest possible return from its Salesforce.com investment. After seeing the initial value the platform delivered for its business, the institution wanted to expand its use of Salesforce.com to solve...

Read More
Heartbleed bug exposes millions of online services to security risks

Heartbleed bug exposes millions of online services to security risks

Credit: heartbleed.com This week, researchers from Codenomicon and Google Security publicly disclosed a critical bug in the OpenSSL cryptographic software package used by millions of internet connected services.  This weakness, referred to as the Heartbleed bug, allows anyone on the Internet to steal information from vulnerable systems by exploiting a protocol designed to ensure the security...

Read More

Healthcare costs are on the rise, so why are provider wallets getting thinner? (Part 1 of 3)

Nearly 70% of healthcare executives currently face challenges due to increasing billing complexity, delayed managed care payments, decreasing reimbursement, or increasing debt. Chances are your organization is faced with at least two of these. It’s imperative to take a decisive approach to solving these types of cash flow impediments to maintain solvency.…

Read More

Hits Keep on Coming: High Availability & Disaster Recovery at Healthcare.gov

When it comes to the IT challenges of the new Healthcare.gov Healthcare Exchange, the hits keep on coming.  Over the weekend, the healthcare.gov hosting vendor, Terremark (a subsidiary of Verizon), “experienced a failure in a networking component” and the attempted fix crashed the system.  The failure is in the “Data Services Hub,” which connects the exchange to other...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons