Foundations - The IT Blog for SMB

Foundations - The IT Blog for SMB

Recent Posts

Don't Let Ransomware Cause Chaos on your Backups

Posted by Alden Gleason on October 22, 2018 10:44:46 AM CDT

 IT Chaos is here—in the form of a ransomware attack locking up critical business data. Good thing there’s Rubrik. The platform’s immutable snapshots, encryption, and end-to-end security have you covered.

Read More

Topics: IT Strategy, Backup, Ransomware, Rubrik, Data Center, Converged

Data Center - What does Freedom Mean to you?

Posted by Alden Gleason on May 21, 2018 10:09:00 AM CDT

 Hear our customers and partners talk about what Nutanix gives them the Freedom to do. Freedom to Build, Run, Cloud, Invent and Play.

Read More

Topics: Consulting, Virtual CIO, IT Management, IT Manager, IT Consulting, nutanix

Data Center - Freedom

Posted by Alden Gleason on May 14, 2018 4:16:51 PM CDT

 Freedom. It’s a powerful notion. A word with deep meaning and reverie to many. Without freedom, we can’t reach our potential as individuals, as professionals, as teams, or as a society.

It's time to free your data center from the burdens of traditional architecture. We can help you unlock the power of your private cloud.

Read More

Topics: Virtual CIO, Managed IT Services, IT Consulting

It's time to say Goodbye to Legacy Backup

Posted by Alden Gleason on February 14, 2018 9:19:59 AM CST

 The IT landscape has evolved radically in the last 20 years, from mainframes, to servers, virtual machines and now the cloud. Through the evolution, our backup infrastructure has stayed the same. Today is the day that changes. A backup solution born in the Cloud Era.

Read More

Topics: IT Strategy, Backup

The Hidden Cost of IT Decisions - Technology TCO

Posted by Alden Gleason on November 6, 2017 9:38:57 AM CST
Small and mid-sized organizations are regularly faced with technology decisions. Unfortunately many times we evaluate these decisions at their face value. How much does it cost to replace it? What is our budget for a computer or server? 

While this approach helps lower costs initially, it generally increases your cost over the assets lifetime. This cost creep is under-estimated, under-reported and under-accounted for.  When looking at purchasing IT Assets its important to balance the CapEx (Capital Expenditure) and the OpEx (Operating Expenditure). The combination of the two make up your TCO.

Total cost of ownership (TCO):
The upfront cost of a product or service and the direct and indirect costs incurred during its lifetime.

Many buyers considering an IT infrastructure upgrade can fall into a pattern of using upfront cost as their key criteria. Not only does this inadvertently neglect potential products or solutions that may be much better suited, but in the long run may actually end up costing a lot more.

Dont believe us? Gartner estimates that 80% of total IT costs occur after the initial purchase (OpEx). 

Texas 24 can help you find the right technologies for your organization. Schedule your free evaluation today. 

Schedule an Evaluation
Read More

Topics: IT Cost, CapEX, OpEX, TCO, Total Cost of Owenership, Tech Cost, Technology Purchasing

My System is Slow

Posted by Tom Gleason on October 30, 2017 11:21:00 AM CDT


This is what we hear from business managers and owners all day long:
Read More

Topics: Errors, WIndows, Slow Computer, Updates

Bad Rabbit - Ransomware

Posted by Alden Gleason on October 25, 2017 3:49:52 PM CDT

The U.S. government has issued a warning about a new ransomware attack that spread through Russia and Ukraine and into other countries around the world.

Read More

Topics: Security, Managed Security, MSSP, Artificial Intelligence, Malware, Bad Rabbit, Ransomeware

Going Phishing?

Posted by Alden Gleason on October 24, 2017 9:00:00 AM CDT
Phishing is a technique hackers use to convince individuals into giving up their usernames, passwords and other personal information. The concept is simple, send an email that looks official from a friend, colleague or service provider. That email contains a link to a login form that looks and behaves like websites we use everyday. The person receiving the email doesn’t think twice about entering their normal login. Now the hacker is now in possession of their stolen identity. The hack doesn’t stop there. Next the hackers will use the new stolen identify to convince others to login to their malicious website. The hack will continue to work up in an organization until they reach the credentials of top executives. These executives typically have access to internal documents, finical data, proprietary information and hold access to critical systems that support the organization.

Spearfishing is when an attacker focuses his efforts on one specific target. The hacker will collect personal details about a specific individual through their social media profiles, blogs and public databases. This will help them form a bait email that has a higher likelihood of success. Once someone has fallen victim, the hackers will install a backdoor into the users computer and begins exploring the network moving latterly from device to device. Once the attackers locate what they are looking for they will send a copy of the data to their servers. Many sophisticated attacks will attempt to remove traces and logs to prevent discovery of what has occurred.
Read More

Topics: Security, Managed Security, Patches, Malware, Phishing


Posted by Alden Gleason on October 16, 2017 5:48:25 PM CDT
Today a research paper titled "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2" was made publicly available by imec-DistriNet Research Group. The paper discusses seven vulnerabilities affecting session key negotiation in both the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols.

802.11r is a standard for improving the roaming experience of wireless client devices as they physically move. This technology enables client devices to automatically associate and disassociate to various access points based off physical location. The vulnerability abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This vulnerability affects numerous wireless products across the industry, and it is considered a critical security concern. We recommend all our customers patch their wireless infrastructures immediately or disable 802.11r until the patch can be applied. We also recommend customers install the Windows, MacOS and iOS updates related to these vulnerabilities. 

For more information please check out Cisco's websites:
Read More

Topics: Security, VULNERABILITY, Networks, Wireless, 802.11, WiFi, Meraki

Texas 24 joins Grapevine Chamber

Posted by Alden Gleason on October 15, 2017 11:44:06 AM CDT
We are excited to be joining the Grapevine Chamber of Commerce! We are looking forward to being part of the local business community in Grapevine, Texas. With over 1300+ business memberships, the Grapevine Chamber of Commerce is known as one of the largest and most successful business chambers in DFW.

Texas 24 is a Managed IT Services company that provides technology solutions for small and mid sized business. Our specialties include, VoIP (Voice Over IP Phone Systems), Cloud Migrations and Management, Network and IP Services, IP Cameras, Server Support, Endpoint Protection, and IT Consulting Services.
Read More

Topics: Texas 24, IT Consulting, MSP, Grapevine, Grapevine, TX, Grapevine Chamber, Managed Service Provider, Grapevine, Texas