Cadents

The Real Cost of Ignoring End-of-Life Notices: Breaches That Could Have Been Prevented

The phrase end of life is one of those deceptively innocent tech terms. It pops up casually in vendor emails or quietly sneaks onto product roadmaps, easy to ignore. But…
title card: Exploits of the past: Things hackers never forget

Exploits of the Past: Things Hackers Never Forget

Outdated hardware can be a significant threat to your network's security. By neglecting hardware upgrades, organizations leave themselves vulnerable to cyber-attacks that exploit known vulnerabilities. It's crucial to have a…
title card: Sitting on the Edge or on the Ledge?

Sitting on the Edge or on the Ledge? 

Network edge technologies—like firewalls, routers, and VPNs—serve as the first line of defense against cyber threats. Yet, many organizations fail to maintain them properly, leaving their systems vulnerable to attacks.

SOC it 2 Me: The Benefits of Software Upgrade Lifecycle Management and SOC 2 Compliance

Maintaining your network operating system software is essential for security, efficiency, and compliance. Software Upgrade Lifecycle Management ensures your software stays updated through patches and upgrades, which is crucial for…
title card: What’s love got to do with it?

What’s love got to do with it?

When I think of Valentine’s Day, I feel warm and cozy and wonder if there is something special I can do for the person I love. This requires that I…
title card: This Time IT's Personal

This Time It’s Personal

“Aubrey, we found your info exposed online.” That was the subject line of an email I received just yesterday from Experian. Unfortunately, yesterday wasn’t the first time I’ve received an…
Title Card: Practice makes perfect, but does it really work in an actual crisis?

Practice Makes Perfect, But Does It Really Work In an Actual Crisis?

One of the primary achievements of IT Operations and Management is the ability to execute tasks quickly and efficiently, ensuring seamless system uptime and functionality. Various monitoring systems are in…
Risky Business: The Art of Mastering Process, Software, and Change title card

Risky Business: The Art of Mastering Process, Software, and Change

What do process, software, and change have in common? Well, for starters, they go hand in hand.
Maximizing IT Productivity: The Impact of Upgrading or Patching Older Network Operating Software blog title card

Maximizing IT Productivity: The Impact of Upgrading or Patching Older Network Operating Software

One of the critical decisions organizations face is whether to upgrade or patch older network operating software. It’s always tempting to delay such updates due to costs or potential disruptions…
blog image title card with the title: Ch-ch-ch-ch-Changes: Basic Principles of Organizational Change Management

Ch-ch-ch-ch-Changes: Basic Principles of Organizational Change Management

The word change is so fascinating. I think about it all the time.   For example, it’s the start of a new year, and we often start the new year…