Loading...
9 08, 2017

The Future Network: Using Machine Learning to Identify Malware

By |2019-07-23T15:11:34+00:00August 9th, 2017|Categories: IT, Machine Learning, Technology|

In the world of cyber security, experts are excited by the fact that they will be able to detect malware in encrypted traffic. It hasn’t been done before and is only possible now because of the emergence of Cisco’s intuitive network. Malware detection is achieved through continuous Machine Learning (ML) on [...]

31 07, 2017

An Overview of Intuitive Networks

By |2021-09-23T17:31:03+00:00July 31st, 2017|Categories: IT, Machine Learning, Technology|

Our partner and industry leader, Cisco, recently announced that an entirely new era of networking had just begun. When the tech giant previously claimed to be years ahead of their networking competitors, they were actually referring to their new network intuitive initiative. This new technology is primarily designed to take advantage [...]

24 06, 2017

Ransomware in the Legal Industry – How to Protect your Firm

By |2019-07-09T19:45:07+00:00June 24th, 2017|Categories: Compliance, Ransomware, Security Solutions, Technology|

Ransomware attacks are on the rise, grabbing headlines on a global stage. In April 2016, the Federal Bureau of Investigation warned that cyber criminals have already extorted $209 million from companies in just three months. This statistic showed that ransomware was on track to become a billion-dollar crime by the end [...]

23 06, 2017

Change Management Matters

By |2018-05-01T02:09:48+00:00June 23rd, 2017|Categories: Compliance, Technology|

Stable networks need it. If you want to have a stable network, you need to have an effective change management process.  Why bother?  Changes are the most common source of instability in your network.  Sure hardware fails now and again, but in the end the most common source of network failures is the hands of those [...]

22 06, 2017

Advanced Unified Communications

By |2018-05-01T02:11:37+00:00June 22nd, 2017|Categories: Insider|

I’m pleased to announce that Acadia has achieved Cisco’s Advanced Unified Communications Certification. This certification authorized Acadia to sell Cisco’s full line of Unified Communications products. Acadia has a long history of designing, installing and managing these systems. This certification will allow us to complete our offering around these products.

21 06, 2017

Building Complex Networks with Virtual Networking

By |2018-05-01T02:10:22+00:00June 21st, 2017|Categories: Cloud, Technology|

Virtual networking is a computer network that consists of a virtual network link. The virtual network link does not consist of a physical, wired or wireless, connection between computing devices and is implemented using methods of network virtualization. Two of the most common forms of virtual networks are protocol-based virtual networks and virtual networks that are based [...]

20 06, 2017

Managing a Myriad of Mobile Devices

By |2018-05-01T01:51:41+00:00June 20th, 2017|Categories: Mobile, Security Solutions, Technology|

The lines between various mobile devices are blurring. As real world applicable mobile technology has just taken flight, many enterprises host a myriad of different platforms. A policy that supports all platforms is a must, especially for companies with non sequitur hardware. This can help you cut down on infrastructure cost and improve operational efficiency. The [...]

19 06, 2017

The Best Security For Mobile Devices

By |2018-05-01T01:48:13+00:00June 19th, 2017|Categories: Security Solutions, Technology|

Many enterprises are now embracing mobile devices such as cell phones and tablets. The rapid adoption of these devices has enabled greater mobility to the workforce. However, it has brought up a myriad of security concerns that need to be addressed in practice and policy. The degree you can control security on the mobile devices used by [...]

18 06, 2017

Your Data In The Cloud – The Good and The Bad

By |2018-05-01T01:35:28+00:00June 18th, 2017|Categories: Cloud, Compliance, Monitoring, Security Solutions, Technology|

An October 10, 2011 Network World article titled “Beware of the iCloud” described an enterprise nightmare scenario around Apple’s newly introduced cloud storage service: “You’re at your office Mac, working on a sensitive company document.  There’s a copy of the document automatically pushed to your iPad, which a family member borrowed and took to Starbucks.  There’s [...]

17 06, 2017

The Consumerization Of End Points

By |2021-09-23T17:35:45+00:00June 17th, 2017|Categories: Compliance|

Consumerization – a term coined in 2001– refers to new information technology emerging first in the consumer market and then spreading into business organizations. The resulting convergence of the IT and consumer electronics industries marks a shift in IT innovation from large businesses to the home. Specifically, more and more people [...]

Go to Top