OneNeck Blog

From ERP application management to cloud and hosting solutions, IT hardware and managed services, you’ll find it here on the OneNeck blog.

  • HCI - Driving Real Business Results

    HCI - Driving Real Business Results

    All businesses have to transform and adapt to do business in an increasingly digital world. But to transform, they must first address the foundation that their business sits on, making...

    Read Article
  • Cloud Backup vs NAS

    Cloud Backup vs NAS

    When it comes to selecting the best backup—NAS (network-attached storage) or cloud-based—there are a multitude of factors IT leaders must consider. To break it down, a recent TechTarget...

    Read Article
  • Components of Successful IT Security

    Components of Successful IT Security

    In its simplest form, compliance is about setting rules and following them, every time. No wavering, no audible—everyone simply follows the rules—every time. Seems easy, but it’s not...

    Read Article
  • 3 Components of Hyperscale Cloud Environment

    3 Components of Hyperscale Cloud Environment

    When it comes to setting up and running a cloud-based IT environment, businesses of all sizes (including small and mid-sized companies) can benefit from leveraging a hyperscale cloud. 

    Read Article
  • Reasons to Backup Office 365 | Cloud-Based Data Backup

    Reasons to Backup Office 365 | Cloud-Based Data Backup

    I need backup for Office 365? Isn’t it already included?  In short, no. The misconception that Microsoft fully backs up your data on your behalf is all too common.  To the contrary,...

    Read Article
  • Anatomy of Ransomware

    Anatomy of Ransomware

    Ransomware is a type of malware that threat actors use to infect computers and encrypt computer files until a ransom is paid. After the initial infection, ransomware will attempt to...

    Read Article
  • Wi-Fi 6 Is Here with Features Like Speed & Capacity

    Wi-Fi 6 Is Here with Features Like Speed & Capacity

    There’s no denying it – the wireless network is the primary way we connect to the digital world. In fact, it’s so big, that traffic from wireless and mobile devices will account for 71%...

    Read Article
  • Understanding Software-Defined WAN

    Understanding Software-Defined WAN

    Bandwidth needs are skyrocketing. To meet the growing demand, there is a transition underfoot to move away from traditional the wide area network (WAN) to the software-defined wide area...

    Read Article
  • Enhance IT Security with Analytics-Driven SIEM

    Enhance IT Security with Analytics-Driven SIEM

     Finding a mechanism to collect, store and analyze security only data is relatively simple. There is no shortage of options for storing data. Collecting all security relevant data and...

    Read Article
  • How to Create Effective Defense Against Cybersecurity

    How to Create Effective Defense Against Cybersecurity

    Creating a strong external security posture is critical. But what can businesses do to protect their data and environments?

    Read Article
  • Cost of Public Cloud

    Cost of Public Cloud

    When it comes to moving to the cloud, businesses of all sizes are feeling the pressure. On one hand, the capabilities offered by the cloud are too good to ignore. If you don’t take...

    Read Article
  • Is it Time to Move Your ERP to the Cloud? | ERP Solutions

    Is it Time to Move Your ERP to the Cloud? | ERP Solutions

    There are many considerations when moving to the cloud, and with large, complex ERP applications, there is even more to consider. We recently sat down with Scott Morley, one of...

    Read Article
  • Evolving Expectations for NMS

    Evolving Expectations for NMS

    The landscape for Network Managed Services (NMS) providers continues to become more challenging, especially as application, management and compliance requirements keep evolving....

    Read Article
  • Older Windows Systems Beware of CVE-2019-0708

    Older Windows Systems Beware of CVE-2019-0708

    Are you running an older version of Windows and not current with your patch management? If so, you need to be aware of a recent exploitable vulnerability that just hit the news this...

    Read Article
  • SDN Re-emergence for Network Efficiency

    SDN Re-emergence for Network Efficiency

    Software Defined Networking (SDN) has been around for almost two decades. The concept was extraordinary and innovative then, but could be considered less-so in 2018. While the...

    Read Article
  • How MFA Adds IT Security | Multi-Factor Authentication

    How MFA Adds IT Security | Multi-Factor Authentication

    TeleSign research indicates that the majority of users use five or fewer passwords for all of their accounts. While it may seem efficient for password memory on your end, you could...

    Read Article
  • Tips for a Well-Architected Cloud | IT Solutions

    Tips for a Well-Architected Cloud | IT Solutions

    There are a lot of opinions to be had about what goes into a solidly-architected cloud. But with so many considerations around reliability, performance and security, too many options...

    Read Article
  • APM vs NPM

    APM vs NPM

    Two terms that get thrown around a lot in our industry are APM and NPM, and it seems they are often interchanged (or confused). So, what is the difference between APM (Application...

    Read Article
  • IT Solutions for Disaster Recovery | A Guide for CIOs

    IT Solutions for Disaster Recovery | A Guide for CIOs

    How can a CIO be confident that IT will perform 24/7/365?  According to Zerto, in today’s always-on, information-driven organizations, IT resilience depends completely on IT...

    Read Article
  • Hybrid Cloud vs Multi-Cloud. What's the difference?

    Hybrid Cloud vs Multi-Cloud. What's the difference?

    In today’s digital world, terms like Hybrid Cloud and Multi-Cloud are thrown around interchangeably.  But there is a difference, and understanding it is key to getting the most out of...

    Read Article
  • loading
    Loading More...