Organizations are migrating their desktops to the cloud as a long-term future state and Azure Virtual Desktop (AVD) is a common implementation choice. Technology migrations can be complex to plan and execute on. Today let’s look more closely at some common AVD use case scenarios and then dive into the top 4 best practices for a …
It’s 2023 and it’s time to review our top 4 predictions for the new year in tech! Enjoy! Evolving Technology Landscape & Resource Constraints Lay Gauntlet for IT Keary Pence, Director of Product Marketing, Goliath Technologies The struggle between workers looking for more work/life balance via remote jobs and organizations looking to recreate the in-office culture, circa …
Major vendors have been doubling down on their investment in Chromebooks, and that effort has paid off — they’ve consistently seen strong returns thanks to the platform’s wide adoption globally. Source (2021). Additionally, as we consider school system adoption for students and educators being a common use case it leaves me wondering how monitoring of these devices …
One of the most common misconceptions organizations succumb to when moving to the cloud is the cloud is inherently secure. This couldn’t be farther from the truth and many organizations end up with more risk than they bargained for. The worst part? Because organizations often leverage multiple cloud providers, they don’t have a handle on where the risk falls …
I have a funny story about ransomware. You see, a long time ago (well not that long in real time, but very long ago in ransomware time) I had a lab in the public cloud that got hit by ransomware. My best guess? Remote Desktop Protocol (RDP), also known as Ransomware Deployment Protocol. There’s a new …
When it comes to protecting our environments, we all pretty much start at a disadvantage. I’ve seen many, many organizations struggle with basic disaster recovery planning, and ransomware has completely changed that game. Remember, it isn’t if you’re attacked by ransomware, but when. What many seem to forget is that the threat actors need to be inside …