<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=446209&amp;fmt=gif">

Exploring AZURE vs AWS

By Greg LaBrie |   Jan 25, 2018

As a society, we love to put entities head-to-head against one another. Automotive enthusiasts have debated Ford vs. Chevy for decades. Every year college football fans debate which conference is stronger: Big Ten or SEC. When it comes to IaaS cloud computing, the inevitable debate between Azure and AWS separates the room between enthusiasts of each provider as well. Unfortunately, deliberating between the two in hopes of distinguishing a clear winner is kind of like debating who the greater basketball player is between LeBron James and Michael Jordan. It kind of all depends on your point of view and what you value.

Recent Malware Attacks and What Businesses Can Learn From Them

By Michael Thweatt |   Jan 23, 2018

It feels like every time we turn around there is a new cybersecurity threat to report that organizations need to protect themselves from. Malware is an unfortunate reality of living in a digital world, but there are many lessons we can learn from these attacks to safeguard sensitive material.

3 Critical Tips for Mitigating CPU Vulnerabilities [Meltdown and Spectre Update]

By David Fafel |   Jan 18, 2018

It’s been two weeks since the IT world was rocked by the news of the CPU vulnerabilities known as Meltdown and Spectre. It’s making headline news due to how far the vulnerabilities extend—to nearly every processor manufactured over the past 20 years—as well as the potential impacts in mitigating these vulnerabilities. Every server, computer, tablet, phone or any other computing device with a modern CPU is potentially affected. (See WEI’s Customer Advisory about Meltdown and Spectre in this blog post.)

The Future of Cybersecurity: 6 Predictions for 2018

By Greg LaBrie |   Jan 16, 2018

Happy New Year! As we say hello to 2018, we can reflect on the massive progress technology made throughout 2017. The cloud came to a new level of maturity, cybersecurity incidents rocked the world and organizations embraced hyperconverged infrastructure as the future of data center modernization. But what lies ahead? Read on for a look at cybersecurity predictions for the coming year.

The New Enterprise Security Perimeter is no Longer a Perimeter

By Greg LaBrie |   Jan 11, 2018

Have you ever looked at your dog or cat staring out the window of your house towards the horizon? Ever wonder if they contemplate what may be beyond their visible perimeter? It used to be that internal IT did not have to contemplate what lay beyond the perimeter. Network security was fairly simple – create a wall of security around the data center and its resources, along with the users and their desktops scattered throughout the building. Traffic passed through the perimeter firewall while users passed through the front building entrance to access the network. It was a page out of the medieval castle defense playbook in that unauthorized users, unknown devices and external threats were kept at bay outside of the walled perimeter. 

WEI StepsUp with Random Acts of Kindness this Holiday Season

By Greg LaBrie |   Jan 09, 2018

WEI recognizes that a successful business has a significant role in the community and WEI shows this with its WEI StepsUp corporate responsibility initiative. This past holiday season WEI carried out its Random Acts of Kindness initiative. This initiative was started by WEI’s founders, Belisario and Leslie Rosas. Every holiday season, each employee is provided fifty dollars to be used to carry out a “random act of kindness.” Random acts of kindness can be grand or small gestures, such as lending a helping hand to someone in need. There are two guidelines:

WEI Customer Advisory: The Meltdown and Spectre Vulnerabilities

By David Fafel |   Jan 05, 2018

WEI is aware of the new vulnerabilities related to Intel and other CPUs which could potentially allow an attacker to gather privileged information from CPU cache and system memory, putting enterprise security at risk. The vulnerabilities are code named “Meltdown” and “Spectre." The “Meltdown” issue is reported to only affect Intel CPUs while “Spectre” is reported to affect Intel, AMD, and ARM. The impact of these vulnerabilities could extend back to CPUs from as early as 1995 (in the case of Intel).

Bitcoin - Speculative Bubble Maybe, Enterprise Security Troubles for Sure

By Greg LaBrie |   Jan 04, 2018

This holiday season, the frenzy is not about the “must have” toy, it is the must have investment – Bitcoin. The TV networks cannot stop talking about the dramatic rise in its value that seems to occur on a daily basis, if not hourly. The cable business news shows shuffle in cryptocurrency and financial industry pundits to discuss the significance the new digital gold and the cryptocurrency market at large. They debate each other whether bitcoin is a sure deal that will continue returning positive dividends, or a bubble that is about to burst. Both sides of the argument have their “experts” as to why you should or should not get involved bitcoin mania. CNBC reports that people are maxing out their credit cards to buy, buy, and buy. Some people are even taking home equity loans on their house to maximize the number of coins they can afford.

How Hybrid Cloud Took the World by Storm in 2017

By Greg LaBrie |   Jan 02, 2018

This year has seen monumental growth in cloud computing and companies are embracing a cloud-first attitude more than ever before. The hybrid cloud computing model allows organizations to leverage the strengths of their current on premise network and augment them with the elasticity and innovations of the cloud. It offers organizations great opportunities, not through new technology exactly, but by a new fresh approach to technology that is continuing to evolve and mature in real time.

What are IT’s Top 10 Wireless Networking Priorities Today?

By Greg LaBrie |   Dec 26, 2017

Is your organization’s wireless networking in need of some modernization? Digital transformation has the power to boost your company’s productivity, bottom line, and even employee retention. While the concept may seem complicated, working with a trusted technology partner helps to simplify these concepts.

About WEI

WEI is an innovative, full service, customer-centric IT solutions provider. We're passionate about solving your technology challenges and we develop custom technology solutions that drive real business outcomes.

Subscribe to WEI's Tech Exchange Blog


Categories

see all
Contact Us