Type - Blog

From ERP application management to cloud and hosting solutions, IT hardware and managed services, you’ll find it here on the OneNeck blog.

  • What is Shadow IT | Know the Risks and How to Manage It

    What is Shadow IT | Know the Risks and How to Manage It

    No doubt about it — if your company has employees, you have shadow IT. According to a survey conducted by Stratecast and Frost & Sullivan, 80% of employees say they use applications on...

    Read Article
  • Manage Cloud Spend in Your Enterprise | Cloud Sprawl Solutions

    Manage Cloud Spend in Your Enterprise | Cloud Sprawl Solutions

    According to Flexera’s State of Cloud 2021 report, organizations are continuing to rapidly increase their cloud spend. In so doing, they struggle to accurately forecast their...

    Read Article
  • Colonial Pipeline a Victim of Ransomware: Is Your Organization Safe?

    Colonial Pipeline a Victim of Ransomware: Is Your Organization Safe?

     

    Read Article
  • OneNeck Named to the RCPmag.com Top 350 Microsoft Partner List

    OneNeck Named to the RCPmag.com Top 350 Microsoft Partner List

    As a uniquely positioned group of Microsoft experts, the Redmond Channel Partner team advocates for Microsoft partners, offering advice on growing their Microsoft services and building...

    Read Article
  • Still Confused About Microsoft's Product Names? | O365 vs M365

    Still Confused About Microsoft's Product Names? | O365 vs M365

    From time to time, we still get questions related to Microsoft’s continuing effort to clarify product offerings and make it easier to use Microsoft Online Services such as...

    Read Article
  • CVE-2021-26855 - Microsoft Exchange Server Remote Code Execution Vulnerability

    CVE-2021-26855 - Microsoft Exchange Server Remote Code Execution Vulnerability

    Over the last couple of days, Microsoft released out-of-band security updates to address multiple vulnerabilities in Microsoft Exchange that could allow an unauthenticated, remote...

    Read Article
  • Is Your Data Holding You Back? Leverage Your Data with Modernization

    Is Your Data Holding You Back? Leverage Your Data with Modernization

    The stats are crazy. There are roughly 3.7 billion humans using the Internet, with 5.6 billion Google searches every single day! Data is the center of our lives, personal and business,...

    Read Article
  • Containers vs VMs (Virtual Machines) | Which is Better?

    Containers vs VMs (Virtual Machines) | Which is Better?

    Containers are quickly becoming commonplace in workplace applications, even replacing virtual machines in some instances. But how do you know if containers are right for your IT...

    Read Article
  • Microsoft Teams Adoption Strategy | Collaboration Tool | OneNeck

    Microsoft Teams Adoption Strategy | Collaboration Tool | OneNeck

    Microsoft Teams is the Hub for teamwork in Microsoft 365. To maximize Microsoft 365 investments, it’s important to plan for a successful deployment and adoption. Planning to ensure that...

    Read Article
  • What Is DevOps?

    What Is DevOps?

    Today’s fast-paced world makes DevOps essential to all enterprises seeking to respond rapidly to changes in customer demands, market conditions and competitive pressures. But, what is...

    Read Article
  • FireEye Red Team Tools Security Breach | Next-Gen Firewalls Can Help

    FireEye Red Team Tools Security Breach | Next-Gen Firewalls Can Help

    Data breaches are everywhere, and everyone is susceptible – even the security experts. This was recently put front and center by the state-sponsored adversary that stole FireEye’s Red...

    Read Article
  • OneNeck's Response to the FireEye Breach

    OneNeck's Response to the FireEye Breach

    Specific to the FireEye breach which identified a widespread compromise of Solarwinds software, OneNeck continues to ensure we are following security industry and vendor recommendations...

    Read Article
  • Microsoft Combines and Renames Products under Microsoft Defender Brand

    Microsoft Combines and Renames Products under Microsoft Defender Brand

    “What's in a name? That which we call a rose by any other name would smell as sweet.” True, Juliet, but a name does matter, especially when it’s simply arbitrary versus describing what...

    Read Article
  • Overcome IT Outsourcing Challenges | Managed IT Services Provider | OneNeck

    Overcome IT Outsourcing Challenges | Managed IT Services Provider | OneNeck

    Nowadays, many organizations eagerly use IT outsourcing to remediate IT skills shortages, control cost and gain access to world-class capabilities. Statistics show that the market size...

    Read Article
  • Why You Should Consider a Managed Backup Service

    Why You Should Consider a Managed Backup Service

    For any modern organization, protecting business-critical data is vital. Yet protecting data assets has become complex and difficult as the rising tide of data grows in double to even...

    Read Article
  • Estimating WAN Latency Calculator | Managed IT Services and Support

    Estimating WAN Latency Calculator | Managed IT Services and Support

    As services move into the cloud, more vendors are publishing the latency requirements for their platform or application. These requirements could specify a maximum latency among...

    Read Article
  • Cisco Jabber for Windows Security Risk

    Cisco Jabber for Windows Security Risk

    On September 2nd, 2020, Cisco issued a Critical Security Advisory announcement regarding Cisco’s Jabber for Windows that customers should be aware of. A vulnerability in Cisco Jabber...

    Read Article
  • Is Your Citrix StoreFront Vulnerable to Exploit?

    Is Your Citrix StoreFront Vulnerable to Exploit?

    On September 14, Citrix pushed out an announcement around a high-severity security vulnerability Citrix StoreFront customers should be aware of. An issue has been discovered in Citrix...

    Read Article
  • Are You Doing What You Can to Protect Your Backups from Ransomware?

    Are You Doing What You Can to Protect Your Backups from Ransomware?

    Ransomware is at our doorstep. We cannot ignore it any longer or think we are not a target. In recent years at OneNeck, we have seen a significant upward trend of ransomware attacks....

    Read Article
  • Is Your Data Secure From the Dark Web?

    Is Your Data Secure From the Dark Web?

    We’ve all heard of the dark web, but most law-abiding people don’t give it much thought, as we chalk it up to the place shady people go to do shady things. But the truth is that today’s...

    Read Article
  • loading
    Loading More...