IT Managed Services

A blog for understanding best practices in technology

CMMC Version 1.0 is Released

To increase the cybersecurity posture of companies operating in government supply chains, the Department of Defense announced the creation of the Cybersecurity Maturity Model Certification (CMMC) in 2019, and a draft was made available. On January 30, 2020, the DoD released Version 1.0 to the public.
Read More

Using a SIEM to Detect BEC & Other Cyber Attacks

Business email compromise (BEC), or imposter email, continues to plague businesses. In these scenarios, criminals gain access to an email account. Then, using the compromised account, they attempt to trick someone into sending money or sensitive information.
Read More

Microsoft 365 vs Office 365

Microsoft 365 and Office 365 are available in two sets of plans – one set for companies with up to 300 employees and another set for enterprise companies. Microsoft 365 includes the Office applications and business productivity tools of Office 365, but with lots more added in. What's even better is that the business plan includes a lot of security features you would expect to find only in enterprise plans.
Read More

Cybersecurity Maturity Model Certification & NIST Compliance

As of December 31, 2017, companies that provide parts and services for suppliers serving the government were required to be compliant with the NIST 800-171 mandate. Starting in 2020, a new certification will be required: Cybersecurity Maturity Model Certification.
Read More

How to Improve Your Firewall Security with a Vulnerability Assessment

Your network firewall serves as the first line of defense between your network and the untrusted Internet. The configuration of the firewall is equally as important as the firewall itself. And since networks evolve over time, you need to check the configuration on a regular basis and make changes as warranted.
Read More

Gain Business Disaster Recovery with Corserva's PC Backup Service

Everyone knows how important it is to back up your data to ensure business continuity. But that's not always easy in today's world where employees are working remotely or taking their laptop to multiple locations.
Read More

How to Select a Provider for Business IT Support Services

No matter the size of your business, you need technical support for any technology used in the workplace. At some point in your company's growth, it is likely you will consider outsourcing at least some of your IT functions. IT related tasks can become burdensome for staff when IT is not their primary function.
Read More

Best Practices in Virtual CIO (vCIO) Services

Recently, Corserva's VP of Technical Services, Sean McCloat, CISSP, was interviewed by Xaas Journal for an article on best practices that managed service providers (MSP) should follow when delivering virtual CIO services to clients.  Read the complete article here: "How to Build the Best vCIO Offering."
Read More

What is a managed firewall?

In the context of Defense in Depth, a firewall is the first step to creating a secure IT environment. A firewall is used to block traffic coming into your IT network as well as traffic going out. Within the simple security model of PROTECT - DETECT - RESPOND, a firewall protects. A firewall's primary function is to provide protection at the perimeter of your network.
Read More

What is IT consulting (and how does it work)?

When technology is not the core capability of your business, hiring an IT consulting firm makes sense. Outside resources can provide more value than trying to use inside staff, especially for specific compliance or security initiatives. Businesses that can leverage the best technologies for their business (and not necessarily the most expensive) gain a competitive advantage. IT consulting firms enable their clients to invest in the most suitable hardware and software for that business.
Read More

Subscribe to Email Updates