About David Allison

This author has not yet filled in any details.
So far David Allison has created 174 blog entries.

What is WannaCry and What Can I Do About It?

We recently discussed ransomware, and why you need to prepare for it. WannaCry is perhaps the most notorious and prolific of recent ransomware-style attacks. It’s stopped businesses, small and large, in their tracks, holding their data hostage and demanding thousands or tens of thousands of dollars in Bitcoin, with no assurance that data would actually be [...]

By |2018-06-28T13:32:55+00:00November 2nd, 2017|

Ransomware is on the Rise. Are you Prepared?

Ransomware continues to be the attack method of choice against businesses around the globe. We are seeing an increase in attacks, with hackers demanding more money, and attacks becoming more sophisticated. These data breaches, in parallel with compliance requirements, can be devastating to a company across numerous fronts. Targets include companies of all sizes, across all [...]

By |2018-06-28T13:33:11+00:00October 10th, 2017|

The “As a Service” Model Comes to Hardware

PC refreshes have fallen to the backburner for many organizations, as IT teams are forced to choose between higher priority initiatives, like mobile readiness, and keeping dated hardware running smoothly. The challenge: buying, deploying and managing hardware is becoming an expensive, antiquated cycle that is difficult to maintain. To solve for this, many companies are turning [...]

By |2018-08-23T16:49:22+00:00August 28th, 2017|

The Rise of the As a Service Model

In today’s digital world, companies need to invest in smart solutions to help them move fast and maintain a competitive edge. The as a Service model, where companies offer services to help other companies become more efficient, offers a path to reduced costs and streamlined workflows. Rather than struggle to do everything in-house—which would take up [...]

By |2018-08-23T16:49:12+00:00August 18th, 2017|

Stepping into the Future of Connectivity

There’s a common debate among IT managers and network engineers: When should you select SD-WAN over more traditional MPLS? The fundamental concept behind MPLS is that of labeling packets. In a traditional routed IP network, each router makes an independent forwarding decision for each packet based solely on the packet’s network-layer header. Thus, every time a [...]

By |2018-08-23T16:49:32+00:00August 1st, 2017|

Cloud Migration: Your Top 6 Cloud Concerns

As companies continue to rapidly adopt the cloud, many of the functions that were traditionally managed by IT organizations are now undergoing a massive transformation. But what are the main risks associated with this cloud transformation—and how can IT teams prepare themselves? iT1 can help. Here, we outline the six main risks and how we can [...]

By |2018-06-28T13:48:06+00:00July 17th, 2017|

The Case for Migrating Your Phones to the Cloud

As your business needs grow, you need technologies that are just as flexible and adaptable as your workforce, and your customers. Today, more workers than ever work remotely or rely on a flexible work schedule. This means they’re more dependent on smartphones and mobile technologies than ever before. At the same time, customers operate in a [...]

By |2018-07-02T11:02:03+00:00June 28th, 2017|

Why You Need More From Your IT Consulting

Let’s face it, hiring IT consultants can be a dicey process. A lot of technical consulting firms have a team with a mixed-bag skillset; you never know if you’re hiring a superb generalist or a true expert. And on the other end of the spectrum, consultants with an impressive pedigree can quickly eat away at your [...]

By |2018-05-17T11:54:25+00:00June 9th, 2017|
Load More Posts

Designed for Every Department

Fill out the form below to download the Designed for Every Department whitepaper from Apple.

Device Enrollment Program

Fill out the form below to download the Device Enrollment Program whitepaper from Apple.

Mac Deployment Overview

Fill out the form below to download the Mac Deployment Overview whitepaper from Apple.

macOS Security

Fill out the form below to download the macOS Security whitepaper from Apple.

Download Hybrid IT for Dummies Lead Form