Webinar Archive
Webinar Archive
Living the Cloud Life: Welcome to Our New Office Space
The adoption of the public cloud is not only changing the way IT consumes technology, but it is also changing the way businesses look at real estate. At least, it SHOULD BE. The most obvious impact of the cloud has been on commercial real estate, and the floor space...
Trade Tariffs May Be the Tipping point In IT Consumption Models
Ready for 25% price increases and long hardware lead times? Trade tariffs may be the tipping point in IT consumption models. Frustrated with the recent lead-time and availability issues with many of the major IT networking, storage, and server vendors? The disruption...
Pinnacle Technology Partners Achieves AWS Standard Consulting Partner Status
Pinnacle's rapid momentum continues with the achievement of the next key partnership milestone with AWS, enabling further value it can deliver to consumers of cloud services. Pinnacle Technology Partners, Inc. (PTP), a born-in-the-cloud consulting and services firm,...
The September Edition of Pinnacle Digest is Here and It’s Packed With Goodness
Here's a summary: The latest must-attend events for October and November AWS accolades Sage advice for IT pros A good read on the top 5 cloud challenges and more!
How to Achieve “Application Awareness” in Today’s IT Environments
In today’s networks, as techniques for delivering applications to end-users have evolved, the demands of users on IT have not diminished. In reality, the requirements for diagnosing problems and fixing them, if anything, have escalated as users are more connected than...
Protecting Your Network from the Latest WPA1/WPA2-PSK Vulnerability
There is a new tool available in the Meraki dashboard to assess if your network is impacted. On August 4, 2018, a new method to exploit a known vulnerability was announced by Jens Steube from the Hashcat project for wireless networks that use WPA1/WPA2-PSK (pre-shared...
Meraki MR + Umbrella: A Match Made In the Cloud
Meraki APs now integrate with Cisco Umbrella, the industry’s first Secure Internet Gateway, to protect wireless clients from malicious online threats. The pace at which new security threats are being introduced and propagated online has reached exponential levels,...
A Personal Attack
Have you recently received an email with one of your actual passwords in the subject line? There is a new email attack circulating where the scammers claim they stole your password and hijacked your webcam. Your password was most likely found in one of the many...
These 5 Books Will Make You Better At What You Do
OK, so most people post in December or January with their list of their favorite books of the past year. But it's summer in TX, and perhaps the heat is getting to me and making me think more about how to work smarter and have more of an impact. That led me to going...
Network Security Challenge: Put Your Security Visibility to the Test
The security landscape changes at such a rapid pace that it’s nearly impossible for security, IT or business leaders to stay on top, let alone ahead, of the latest threats and how they can best protect their sensitive data.The most dangerous threats are the ones you...