Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Author: Michael Otey

Michael Otey is president of TECA, a technical content production, consulting and software development company in Portland,

AWS and Azure used in SolarWinds Attack

by Michael Otey

The SolarWinds exploit was one of the biggest security breaches of the past year. There’s now no doubt that this cyberattack was the result of a very sophisticated effort. Microsoft estimated that it was the likely result of a 1000 engineers working on the creation of the malware. The attack worked by compromising SolarWinds’ software… Read More

AWS Announcement Highlights for February 2021

by Michael Otey

In spite of the heavy winter weather and ongoing pandemic, Amazon continues to churn out an impressive set of enhancements for AWS. Here are some of the highlights from Amazon’s February 2021 AWS announcements. AWS Outposts support local snapshots To better enable businesses to meet their data residency and local data processing needs, Amazon announced… Read More

Disaster Recovery and the SolarWinds Exploit

by Michael Otey

One of the biggest malware attacks in recent history was the SolarWinds exploit where malware was spread through SolarWinds’ software update process to thousands of government and private sector customers. SolarWinds is a well-known provider of IT management products and their Orion infrastructure monitoring and management platform was the product that was attacked. Automatic updates… Read More

Four Common Disaster Recovery Myths

by Michael Otey

Most organizations have finally been convinced about the need to have a robust disaster recovery (DR) plan to protect their essential workloads. That’s due in a big part to the fact that almost everyone in IT is all too familiar with Murphy’s Law that states if something can go wrong it will go wrong and… Read More

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: