Don’t waste another minute securing printer vulnerabilities.

Quick question: What’s a better investment of IT resources – configuring printers or optimizing cloud strategy? No, it’s not a trick question. Printers often fall into a subconscious category of technology we think should “just work.” In a perfect world, you could refocus your IT efforts and better spend your time elsewhere after initial deployment, because printer vulnerabilities wouldn’t threaten your network, and Office Space would have taken a bat to the water cooler instead.

If you’re wondering who in their right mind spends that much time on a piece of hardware as benign as printers, we have some enlightening information for you. Printers – being the connected devices they are today – fall prey to the same malware infecting the computer on your desk, and they can even distribute it. Knowing this, it shouldn’t come as a surprise that IT managers find themselves frustrated with the prospect of managing the security of an entire fleet of printers. Watch an entertaining video that shows how if you’re not taking your device security seriously, someone else might be.

How can you spend less time securing printers and more time focusing on the glamorous aspects of IT? We have a few suggestions to get you started. Continue reading

If you paid for Intel vPro technology, you should be using it.

Get more value from your vPro-enabled devices.

As one of the country’s largest solution providers, Zones deploys thousands of mobile devices and PCs powered by high-performance Intel® Core™ processors with vPro™ technology to businesses around the world.

Intel’s vPro technology describes a range of features that enhance the security, manageability, and performance of computers built around high-end Intel Core processors.

But too often, the hardware-enhanced remote manageability and security capabilities that vPro was designed to deliver don’t get activated by IT, leaving a lot of value on the table.

We can help you identify vPro-equipped machines in your fleet and get all the benefits of the features you’ve already paid for. Continue reading

Who’s the New Grandmaster?

Making the right moves to win the security challenge.

This year marks the 20th anniversary of the final match game between chess champion Garry Kasparov and the IBM supercomputer Deep Blue. The world watched as Kasparov became the first world champion to be defeated in a match by a machine. The loss sparked the debate of “man versus machine” in the digital age.

Fast-forward to the present, and the debate continues. Only now, we’re talking about machine learning too. But this is well-established technology. So, why all the interest? The answer is simple Continue reading

When it comes to cybersecurity, the best offense is a good defense.

Every 40 seconds a company is hit with ransomware, and the WannaCry outbreak is a perfect example. WannaCry demonstrates how ransomware attacks can quickly spread across and cripple environments by exploiting critical vulnerabilities in Windows computers – at least in those not updated with the patch Microsoft issued in March of this year (MS17-010) or the emergency update issued for XP on May 13, 2017.

Of course, running out-of-support operating systems such as XP is risky. But, XP by itself is not the biggest problem. The larger issue is complacency around security updates, operating system updates, and OS upgrades across the infrastructure. Continue reading

The foundation of a successful OS upgrade

Upgrading your organization’s operating system is a big investment in time, money, and resources. But of course, it’s worth all the work.

After all, you’ll be delivering a more secure and responsive infrastructure that will support your business for years to come.

A successful migration starts with a Zones OS Readiness Assessment. This professional service administered by our Advanced Solutions Group will help you verify that your systems have everything necessary to deploy, integrate, and support the new OS. Continue reading

Shaky disaster recovery plan? There’s no excuse anymore.

Everyone knows that a comprehensive disaster recovery plan stands to pay for itself – should you need to use it. But over the years, we’ve seen many businesses fail to make the necessary investments in time and money to create one. Some were lucky. Many were not.

Of course, critical systems for banks, finance, and healthcare had significant redundancies built into their IT architecture. After all, these organizations could afford complex solutions maintained by some of the most talented IT folks in the industry. But many firms simply could not afford or maintain the necessary skills on staff to support a true disaster recovery solution for key applications and IT systems. Continue reading

The future of print technology is here

HP PageWide is reinventing office printing in more ways than one

It used to be a given in the print industry that if you wanted speed, you sacrificed quality – and vice versa. But HP stepped in and decided to disrupt conventional thinking and implement forward-looking investments in print technology.

It all began with the introduction of HP Scalable Print Technology (SPT), which included research and development in printhead technologies, advanced inks, materials, design rules, and precision production methodology.

And from there, SPT evolved into HP PageWide Technology; the latest HP printing innovation that outpaces the competition in numerous ways, and on practically every level. Continue reading

Cybersecurity trends underway in 2017

The past year has seen seismic changes in the cybersecurity landscape.

They’re forcing IT professionals to rethink and re-strategize their organization’s security. They’re being tasked with ways to better control access to their network, gain a deeper understanding of how vulnerable their network is to threats, and develop a faster, decisive response plan when a threat occurs.

If any of the above resonates with you, you’re not alone. The cybersecurity market is expected to swell to $100 billion dollars by 2019. And now that we’re a quarter of the way through 2017, there’s good reason to be forward-looking and take proactive steps to ensure that security is in your company’s DNA.

Gone are the days when traditional security management approaches of multiple point products, manual change processes, extensive policies and data silos, did the trick. Given the growing complexities of networks and rapid delivery of services and applications, a deep, up-to-date rebooting of how you approach your network security is not only crucial – it’s necessary. Continue reading

Want to simplify the mobile infrastructure fast? Here’s how.

Ever since smartphones displaced the BlackBerry as the device of choice among pretty much everyone outside of government, businesses have been working hard to devise a simple, all-things-to-all-people approach to mobile deployments.

BYOD is cheap, but is by definition a multi-platform solution that presents a number of compatibility, management, and security issues. CYOD strategies restore a good deal of control to the organization, but add to the number of devices an employee will be carrying.

The recent launch of HP’s Elite x3 and VMware’s Workspace ONE could change all that. Continue reading

Not all clouds are created equal

Cloud-Storage-Blog-graphic-742x388Why it’s important to optimize yours to stay cloud compliant

It’s a given that many smart companies, big and small, are moving to the cloud at breakneck speed. They’re looking to increase productivity, enhance collaboration, ensure business continuity, and reap the cost benefits. But a move to the cloud also presents potential risks as security and compliance protocols also move from your servers to someone else’s.

Cloud compliance is an issue for anyone using cloud storage or backup services, and the decisions you make regarding where it’s stored, how it’s shared, and who has access to it can greatly impact the operations of your business.

That’s why now – more than ever – it’s important to evaluate and optimize your cloud computing environment.

Continue reading