cloud readiness

Cloud Readiness Assessments

Cloud Readiness Assessments   In support of the Governor’s Executive Order Nineteen (EO19, issued on September 17), AISN is able to deliver Cloud Readiness Assessments to help Virginia’s agencies meet EO19’s Cloud Service Utilization and Readiness within 60 days. Our EO19 Cloud Readiness Assessment capabilities are here: https://www.aisn.net/cloud-readiness-assessment-services/. Broadly, we can save agencies time by…

risk-assessment

Risk Assessments Can Save Your Business

Risk Assessments Can Save Your Business Think risk assessments can save your business? You’re right. A risk assessment is a critical component of any organization’s infrastructure. They help to create an awareness of risk. In today’s threat landscape, specifically relating to cybersecurity, it’s more important than ever to know where your assets live, fully understand…

ensuring security

Ensuring Security and Compliance

Ensuring Security and Compliance Most organizations tend to focus on becoming compliant rather than being secure. And while meeting client requirements and industry regulations is very important, it does not necessarily guarantee that your organization is secure. If your entire information security program is based on “What must we do to be compliant?”, you’re probably…

information security program

Information Security Program Is Critical

Information Security Program Is Critical An information security program is a critical component of any organization regardless of the size of your business or the industry you’re in. A good information security program consists of a comprehensive set of information security policies and procedures, which is the cornerstone to any information security program. Whether you’re…

KRACK security flaw

KRACK Security Flaw Protection

KRACK Security Flaw Protection Researchers have discovered a new weakness found in the WPA2 protocol (Wi-Fi Protected Access 2), the security method which protects all modern Wi-Fi networks, known as the KRACK security flaw. Although there is no evidence at this time that the KRACK vulnerability was maliciously exploited, this still raises many concerns for…

Azure Government

Government Data Scientists Be Glad

Government Data Scientists Be Glad   Government data scientists spend inordinate amounts of time each day manually scrubbing terabytes of operational data for advanced analytics and business intelligence. Well, now they can be glad that Microsoft has unveiled its new data analytics and visualization offerings, called HDInsight and Power BI, as part of the Azure…

school quality profiles

School Report Cards for Virginia

School Report Cards for Virginia The school report cards for Virginia’s schools, school divisions and for the state never looked better! Today, AIS Network announced that we’ve wrapped up development work on the Virginia Department of Education’s School Quality Profiles website. One more reason that I’m particularly proud of this project is because I’m the parent…

cost of downtime

Cost of Downtime

Cost of Downtime Ever calculate the cost of downtime? A major new survey by Veeam Software did, and the results reveal that there’s far more to system downtime than the bracing hard costs. In its fifth annual “Availability Report,” Veeam interviewed 1,140 senior IT staff in 24 countries, including 150 U.S. folks.  All of the…

frustrated man confronts hackers

When Hackers Strike

When Hackers Strike “The battle against terrorism is not only a military battle, but primarily a battle of information” -Ahmed Chalabi   In today’s globalized and cyber-connected world, hackers are a real and present danger. The threat of “bad guys” extends to the Internet and the security of your life and personal information. Throughout history,…