Blog
What is a vCIO?
By Christopher George chief information officer, IT
The virtual Chief Information Officer (vCIO) will provide technology vision and leadership in the development and implementation of the affiliate-wide information technology (IT) program. The vCIO will lead the Client organization in planning and implementing enterprise information systems to support both distributed and centralized business operations and achieve more effective and cost beneficial enterprise-wide IT operations. Additionally:
Assessments: Billable? Necessary? All the Same?
By Christopher George assessment
Lots of vendors in this space give away assessments yet Protelligent charges for them. Why? We’re not saying our way is the only way, we just feel we’re both better served doing it this way. What is an assessment?
You’ve Virtualized Your Servers, Why not Your CIO?
By Christopher George chief information officer
As noted in our article on enterprise grade IT support, the typical organization cannot afford the six figure plus cost of a Chief Information Officer. Which is unfortunate because its this resource that understands how to show the financial returns of IT investment. Its this resource that sits at the CEO roundtables, helping set strategic direction, helping the organization lift IT above the all too typical view of it being a cost center. Its this resource that creates the organizational...
Protelligent talks about “Enterprise Grade” IT support
By Christopher George enterprise
Protelligent talks about making available “Enterprise grade” IT support to the SMB space as if it’s some big deal…what is Enterprise grade? An enterprise is a very large business…think Fortune 500, an organization which often has tens of thousands of employees. At this scale, the firm can justify the cost of a robust IT team, staffed with technical experts on a range of topics. This means the employees usually get top notch support. The productivity of an employee in this environment has a...
Simple Post Item
By Christopher George Arts, Custom Design, Graphics
Praesent velit tellus, adipiscing et, blandit convallis, dictum at, dui. Integer suscipit tortor in orci. Phasellus consequat. Quisque dictum convallis pede. Mauris viverra scelerisque mauris. Nulla facilisis, elit malesuada pretium egestas, dolor arcu commodo est, at egestas massa tortor ut ante. Etiam eget libero. Aenean pretium, tellus sed sodales semper, turpis purus aliquet orci, pulvinar ornare odio tortor sit amet dui. Aenean id orci. Cum sociis natoque penatibus et magnis dis parturient...
Toto, I have a feeling we’re not in Kansas anymore
By Christopher George advanced persistent threats, apt, cisco, Cisco Cloud Web Security, Cisco Security Intelligence Operations, cyber, exploit
Cyber threats and attacks used to be about fame, politics, boredom and personal challenge. Now, it’s about ROI. Criminals have evolved and become more strategic – advanced persistent threats (APTs) are here and antivirus protection and traditional firewall port security are no longer enough. Criminals using APTs want data, so the more valuable an organization’s data, the more likely it is to be targeted. Government agencies and organizations in industries such as finance, energy, healthcare,...
Tips on moving your business to the cloud!
By Christopher George benefits, business, Cloud, IT
Many clients ask us about the benefits and steps required to move their business’ network infrastructure to the cloud. Following are five steps we use to help you optimize your return-on-investment. 1. Create a 3- to 5-year business plan outlining the necessary investments and benefits of moving your computer network to a cloud service 2. Perform a Cloud Readiness Assessment. Assess what network resources you have in place now, what you will need in the future, and how these resources would be...
Recent Posts
Archives
- August 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (1)
- March 2020 (1)
- February 2020 (1)
- January 2020 (1)
- December 2019 (1)
- November 2019 (1)
- October 2019 (1)
- September 2019 (2)
- July 2019 (1)
- June 2019 (3)
- April 2019 (1)
- March 2019 (1)
- February 2019 (1)
- January 2019 (1)
- December 2018 (1)
- November 2018 (1)
- October 2018 (1)
- September 2018 (1)
- August 2018 (1)
- May 2018 (1)
- March 2018 (1)
- February 2018 (1)
- January 2018 (2)
- December 2017 (2)
- November 2017 (3)
- October 2017 (3)
- September 2017 (2)
- August 2017 (3)
- July 2017 (2)
- June 2017 (5)
- May 2017 (7)
- April 2017 (5)
- March 2017 (5)
- February 2017 (1)
- January 2017 (5)
- December 2016 (1)
- October 2016 (4)
- September 2016 (1)
- August 2016 (3)
- July 2016 (1)
- June 2016 (1)
- May 2016 (1)
- April 2016 (1)
- November 2014 (1)
- July 2014 (2)
- June 2014 (1)
- May 2014 (3)
- April 2014 (3)
- March 2014 (1)
- February 2014 (2)
- January 2014 (3)
- December 2013 (1)
- November 2013 (4)
Categories
- Community (19)
- Cloud (18)
- IT (16)
- cloud backup (16)
- cybersecurity (15)
- cloud backup data recovery (9)
- cloud computing (8)
- clouddr (8)
- it security (8)
- cloud storage (7)
- data security (7)
- AWS (6)
- Education (6)
- cloud services (6)
- Giving Back (3)
- cloud restoration (3)
- compliance (3)
- data (3)
- assessment (2)
- business (2)
- chief information officer (2)
- client satisfaction (2)
- cloud data recover (2)
- cloud dr (2)
- critical power exchange (2)
- cyber (2)
- cyber responsibility (2)
- data recover (2)
- datacenter (2)
- duo security (2)
- end-to-end encryption (2)
- hackers (2)
- holiday season (2)
- internet (2)
- storage (2)
- 2019 goals (1)
- Android (1)
- Arts (1)
- Business Continuity (1)
- CASBO (1)
- Cisco Cloud Web Security (1)
- Cisco Security Intelligence Operations (1)
- Custom Design (1)
- Graphics (1)
- Protelligent (1)
- Virus (1)
- account protection (1)
- advanced persistent threats (1)
- alien vault technology (1)
- alienvault technology (1)
- antivirus program (1)
- antivirus software (1)
- apis (1)
- apt (1)
- attachment (1)
- attack (1)
- automatic updates (1)
- awareness (1)
- backup (1)
- benefits (1)
- best practices (1)
- bot-driven attacks (1)
- bring your own device (1)
- bug (1)
- business growth (1)
- byod (1)
- california joint powers insurance authority (1)
- california jpia (1)
- check cashing (1)
- cisco (1)
- cjpia (1)
- client testimonial (1)
- cloud backup vs cloud storage (1)
- cloud computing services (1)
- cloud conversion (1)
- cloud migration (1)
- cloud recovery (1)
- community link consulting (1)
- compliance program (1)
- compliance regulations (1)
- computer science (1)
- computer security (1)
- computers (1)
- contain attacks (1)
- cost of cybercrime (1)
- cost of data breach study (1)
- critical power (1)
- critical power products & services (1)
- customer testimonial (1)
- customer testimonial video (1)
- cyber liability (1)
- cyber-threat (1)
- cybercrimes (1)
- cybercriminals (1)
- cybersecurity program (1)
- data access (1)
- data breach (1)
- data breach protection (1)
- data center (1)
- data encryption (1)