It may be easy and understandable to look at these two terms and think “computers” and “security” and with that come to the conclusion that both are very similar or even the same thing! These two items do share a common element – security – but both...
How Cybersecurity Differs From Enterprise cybersecurity
The Cost of On-Premises IT Infrastructure
A couple of recent events bring to light the true costs of running an on-premises IT infrastructure.The widespread, and long-lasting power disruption in Texas, and the 0-Day Microsoft Exchange vulnerability that is still being actively exploited at...
Staying On Top of Cybersecurity News
The field of Information Technology is in always in flux. New software and hardware are released regularly - the only constant is change. As an IT Consultant it's important to stay up to date on what's out there and what's happening in the world of...
Why Use Cloud Storage?
Ahhhh, file storage. A favorite topic of many a SysAdmin. Data storage is a necessity for any business, different lines of business may have different requirements for their data storage. Now there’s cloud storage, and you may still be using...
Active Directory CIFS (Samba) w/ CentOS/Red Hat Enterprise Linux 8
There are many guides, cheat sheets, and white papers on authenticating Linux with Active Directory, and many different ways to do it. This iuvo Technologies blog will go through one tried and true method that works on CentOS/RHEL 8. We will also...