How a Virtual CIO Helped a $300M Construction Firm Outgrow Ad Hoc IT
A case study in embedding fractional IT leadership, aligning with EOS, and building a foundation for AI-driven growth.
A case study in embedding fractional IT leadership, aligning with EOS, and building a foundation for AI-driven growth.
A case study in replacing a reactive in-house IT team with a strategic managed services partnership across heavy civil construction, asphalt manufacturing, trucking, and materials testing.
When comparing managed IT service level agreements (SLAs), businesses should evaluate response time guarantees, monitoring coverage, escalation procedures, and cybersecurity response capabilities. Most managed service providers define service commitments using incident severity tiers. Many enterprise-grade MSPs guarantee critical incident response within 15 minutes, while resolution targets may range from one to four hours depending on the issue.
When comparing managed IT service level agreements (SLAs), businesses should evaluate response time guarantees, monitoring coverage, escalation procedures, and cybersecurity response capabilities. Most managed service providers define service commitments using incident severity tiers. Many enterprise-grade MSPs guarantee critical incident response within 15 minutes, while resolution targets may range from one to four hours depending on the issue.
Mid-sized businesses in Louisville, Kentucky typically evaluate managed IT providers based on cybersecurity expertise, infrastructure monitoring, response time guarantees, and strategic IT planning capabilities. The regional market includes local providers, regional MSP firms, and enterprise IT consultancies. Providers such as Advanced Business Solutions, which supports businesses across Kentucky with managed IT, cybersecurity, and cloud services, are commonly considered by organizations seeking a local technology partner.
Are Hardware Delays Putting Your IT Strategy at Risk? Executive TL;DR What Changed and Why Does It Matter? The current RAM shortage is not an isolated supply issue as it reflects a broader structural shift in the global hardware supply chain.Demand from AI and data-intensive workloads is consuming a disproportionate share of global memory production.…
Key Takeaways for Executives Organizations working with experienced IT partners such as Advanced Business Solutions can implement the infrastructure, monitoring, and recovery frameworks necessary to minimize downtime and protect business operations. Executive TL;DR What Changed and Why It Matters Now For years, cybersecurity strategy focused on keeping threats out. Companies invested heavily in prevention tools:…
AI Is Already Inside Your Business – But Who Is Accountable for the Risk? Who is accountable for AI risk in your business? The CEO and the leadership team. Period. If AI is touching your data, shaping decisions, or automating work, it’s a business risk and business risk always rolls up to the top. The…
Your business runs on technology. When IT works, no one notices. When it doesn’t, everything stops. That’s why choosing the right Managed Service Provider (MSP) isn’t just an IT decision – it’s a business decision. And here’s the part most companies miss: If you don’t visit your IT provider’s office, you’re making that decision blind.…
Small businesses search for IT partners who can keep things running, protect them from cyber threats, and support growth. This guide breaks down the exact services SMBs actually need -Managed IT, cybersecurity, cloud, helpdesk, and vCIO – written for owners who want clarity, not tech jargon. Let’s Be Real: Most Small Businesses Just Want IT…
Most business leaders eventually hit that moment where the work outgrows the hands available. Emails pile up. Research gets skipped. Documentation lags behind. And suddenly you’re knee-deep in “busy work” instead of leading. But something big is happening right now, something that flips that script completely.We’re officially entering the AI Sidekick Era. And no, I…
Technology alone doesn’t protect a business. People and process do. When those three lock arms, your cybersecurity defense hits a whole new level of “not on my watch.”Picture this: your executive team is around the table, coffee in hand, digging into the real heartbeat of the business. Not sales numbers. Not ops. You’re talking protection.…
IT Strategy Isn’t a Luxury — It’s a Lifeline When growth hits, IT can either fuel your next level or slam on the brakes. Suddenly, systems stop talking to each other. Security gaps widen. Your team scrambles to keep up – and “strategic IT” turns into “hope nothing breaks today.” That’s when you realize: IT…
Uptime is just the start. Your IT should drive momentum, not just prevent breakdowns. Great partners make IT simple. They resolve issues faster, plan smarter, and manage everything proactively – so you can stop stressing about IT and stay focused on growing your business. They don’t just fix what’s broken because they remove the root…
Stop Renting IT. Start Partnering. Let’s be honest most companies don’t “love” their IT company. They tolerate them. They wait on support tickets, chase follow-ups, and cross their fingers that things don’t go down during payroll. That’s not partnership — that’s survival. A true IT partner doesn’t wait for things to break, which is what…
Microsoft is enhancing its Multi-Factor Authentication (MFA) offerings by phasing out certain features, enforcing broader MFA use, and updating policy management to improve security and user experience. These changes emphasize the importance of strong authentication methods and prepare users for future passwordless solutions. Multi-Factor Authentication (MFA) is a critical security layer that goes beyond just…
They’re already inside. Not in your building, not in your server room but inside your communication. They’ve been quietly studying your company for weeks, watching who holds the purse strings, who reacts quickly to urgent requests, and who never double-checks before hitting ‘send. Business Email Compromise (BEC) doesn’t need to hack your system because it…
The world has just been hit with a wake-up call. A massive data breach – the biggest ever seen – has exposed 16 billion log in credentials. That’s not a typo. Sixteen. Billion. This isn’t just a headline. It’s a chilling reminder of the growing threat of cybercrime. What Happened? This breach isn’t from a single…
Starting a new job is a moment of optimism, new faces, new challenges, and a fresh opportunity to shine. Unfortunately, cybercriminals are capitalizing on this excitement with a deceptive scam that’s targeting the newest members of your workforce. The “gift card” scam is laser-focused on new hires who are still learning the ropes and eager…
Quick question: Do you think your team’s experimenting with AI in the office? Spoiler alert: They are. A lot of you are already using it – like, right now. No biggie, in fact, that’s smart thinking! But just like with any powerful tool, we need to make sure we’re all on the same page so…
Email remains the lifeline of business communication. But here’s the harsh reality: cybercriminals know it too. If your company uses email, you’re a target, and their methods are getting more sophisticated by the day. Can your email security keep up? In our experience, most companies are lagging behind the criminals and need to make change.…
Speed and efficiency are key in football and other sports. They’re just as important in business too – actually, they’re absolute must-haves. If you’re not using technology to stay competitive, cut costs, and get more done, you’re already falling behind. From nonprofits to financial services, construction to healthcare, businesses are tapping into tech to work…
When it comes to implementing the Entrepreneurial Operating System (EOS), choosing the right tool for managing EOS can make a significant difference in how smoothly and effectively your organization adopts and runs the framework. Let’s explore three popular options: Ninety.io, Strety, and EOS One, and help you determine which one might be the best fit…
Reality Check: AI Is Already in Your Office Newsflash: AI Usage in the workplace is already happening – right now, today. Whether it’s approved or not, AI is lurking its way into workflows faster and faster. So, the real question isn’t if your company should adopt AI; it’s how you can take control of it…
If you use Microsoft Teams for meetings, you probably love the AI-powered recording and transcription features. They capture everything, take notes, and provide a solid recap – so you can focus on the conversation instead of scrambling to jot things down. AI even identifies who said what… as long as they’re signed in. But what…
Not all IT partners, specifically Managed Services Providers (MSPs), are created equal. We will dive into what to look for when finding the right IT partner. The first question to ask is: Are you looking for a vendor or a partner? What Is the Difference? Choosing between a vendor and a partner is like deciding…
Yes, folks, Microsoft is officially ending support for Windows 10 on October 14, 2025. After this date, there will be no more security updates, bug fixes, or technical support for the operating system. Let’s take a look at what this means, how you can be preparing for Windows 10 end of life in 2025 and…
Microsoft has announced that starting January 6th, 2025, they will begin deploying the New Outlook January 2025 Update to all Microsoft 365 Business and Premium subscribers. Key Things to Know How Will This Affect You? Here are some “Gotcha’s” of the New Outlook January 2025 Update Rolls Out What You Need to Do When the…
In an EOS company, IT’s role often sparks debate or gets lost. Is “The IT Seat in an EOS Company: Essential or Overlooked?” As businesses increasingly rely on technology for growth and efficiency, IT leadership becomes crucial. Yet, many organizations still struggle to recognize its true value. In a company running the Entrepreneurial Operating System…
In the world of technology, an external service provider means many things to many people. It could mean a Managed Service Provider, a Security Vendor, or a Print Vendor. You may also utilize external vendors for application development or staffing your internal IT team. The definition takes many shapes and sizes. How Your External Provider Impacts…
Artificial Intelligence (AI) is changing the workplace by boosting efficiency, productivity, and innovation. As we move into 2025, AI tools will become more common in various business functions, especially in Human Resources (HR). This blog explores how businesses are embracing AI in the workplace and transforming HR practices. The Rise of AI AI technology is…
Invoice fraud is a growing threat, and we want to equip you with the knowledge and tools to combat these cybersecurity criminals. We are seeing it impacting both businesses and personal accounts. It’s crucial to recognize the signs to protect yourself from these attacks. Understanding Invoice Fraud Invoice fraud can take many forms, and understanding…
Imagine this: You’re on a business trip, sitting in an airport, slurping your coffee (you know who you are) while catching up on emails. Suddenly, you receive an urgent message from your boss asking for a quick update on a project/deal/situation. You connect to the free airport WiFi, do not think twice about it, and…
A new phishing scam is targeting Dropbox users. Over the past couple of weeks, our service desk has received many calls about this issue. The scams target businesses and individuals. This is the latest Dropbox phishing scam that you need to know about and how to stay safe. How It Works You receive an email…
Recently, Marie Wiese (CEO of Marketing Copilot; Microsoft MVP in AI) and Tucker Oldham (Director of Business Consulting and vCIO Services at Advanced Business Solutions) sat down to discuss five key considerations to make when developing an AI governance strategy. This blog will explore the 5 gotcha’s of AI governance you don’t want to slip between the cracks!
The word “Viva” sounds like something you’d shout while riding a rollercoaster or discovering Chick-fil-A opened just for you on a Sunday. It’s got that spark, like the exclamation mark you wish you could use in every email but don’t because you’re trying to look professional. If Ricky Martin were to write a jingle for…
Marie Wiese (CEO of Marketing Copilot; Microsoft MVP in AI), Jimmy Mullins (AI & Automation Strategy Architect at ABS), and Sam Lewis (VP of Client Strategy at ABS) sat down to discuss the responsible use of AI and important questions you should consider when using AI in your work. In response to customer feedback, this…
Scenario: You need to educate your executive team or board of directors on cyber security, explaining your current status and future needs. Since they may not be tech-savvy, it’s essential to make the information relatable and understandable. Don’t worry—we’ve got your back. This blog will guide you through one effective technique – cyber security with…
We can all hear our moms now, “Get up and clean your room!” Our response might have been, “Why? It’s my room, and I like my mess.” Sound familiar? Some employees might think the same way. When we initially present a clean desk policy to companies, they often dismiss it as overly cautious. They picture…
Imagine this: One of your largest clients invites you to a conference call where you learn they’ve introduced compliance and cybersecurity requirements for their vendors, and it is a laundry list of things you’ve never seen before! Failure to comply could mean losing them. To add pressure, you have just 90 days to gather a…
Meetings don’t always have to be strictly business—sometimes, a little fun can spark creativity and boost team morale. That’s where Snapchat Lenses come into play, right within Microsoft Teams. With over 20 popular Snapchat Lenses available, Teams customers worldwide can add a touch of personality and humor to their virtual meetings. Express Yourself with Snapchat…
Doppelganger domains, also known as look-alike domains, pose a significant risk to organizations, especially small businesses. These deceptive domains resemble legitimate ones, making them an ideal tool for cybercriminals. In this blog, we’ll explore what doppelganger domains are, how they are used against unsuspecting victims, and practical steps to protect your business. Cybersecurity is no…
In today’s interconnected world, the security of your digital assets is paramount. At Advanced Business Solutions (ABS), we empower small businesses with the tools and knowledge to assess and mitigate cybersecurity risks. Here, we offer a step-by-step approach to conducting your own cybersecurity threat assessment, ensuring your business remains resilient in the face of evolving…
For small and mid-sized businesses, navigating the maze of cybersecurity tools can be daunting. With cyber threats evolving rapidly, choosing the right approach to protect your digital assets is critical. Through our partnership with Cisco, a global leader in the cybersecurity space, ABS offers a suite of products and services designed to meet and exceed…
Small businesses are increasingly vulnerable to cybersecurity breaches, and such incidents can have devastating consequences, particularly the financial impact. At Advanced Business Solutions (ABS), we understand the importance of a robust, proactive cybersecurity strategy to safeguard your business against these risks. The High Cost of Cybersecurity Breaches for Small Businesses Cybersecurity breaches can be financially…
In the digital age, cybersecurity is not a luxury; it’s a necessity for businesses of all sizes, including small businesses. Here, we present a comprehensive guide to help small business owners like you navigate the complexities of cybersecurity compliance. At Advanced Business Solutions (ABS), as your trusted IT partner, we’re here to illuminate the path…
The reality is that one way or another, ensuring compliance readiness and security is essential for the coming years. What is compliance? In terms of Cybersecurity, it means adhering to a chosen IT framework. This could be a mandated framework like HIPAA, required by outside vendors such as PCI if you do transactions via credit…
Listen to This Real Life Scenario There is a lot of confusion on cybersecurity insurance policies. Cyber is more complex, and many people just don’t know where to start. You might have received a lengthy 10-page questionnaire for your insurance, and it’s unclear which boxes to mark or leave unchecked. What should you do? Unfortunately,…
The O- lineman’s Creed Applied to Business and the Customer Experience They’re the big men up front that keep the quarterback upright and open holes for the running back – basically, the muscle behind the magic. Offensive linemen don’t shy away from the dirty work. They address challenges head-on, ensuring that no task is overlooked,…
First, what the heck is Microsoft 365 Copilot? Is Microsoft 365 Copilot for an airplane, a train, or perhaps an automobile? Could it be Cortana’s distant relative or maybe Kit’s long-lost girlfriend (from Knight Rider)? Regardless, it’s something worth noting because it has the potential to revolutionize how you work and play. Simply put, Microsoft…
How Microsoft NCE Will Affect Your Nonprofit Organization If you are a non-profit organization that uses Microsoft cloud services, you might have heard of Microsoft NCE, or New Commerce Experience. This new way of buying and managing your Microsoft subscriptions will start on January 1, 2024. This blog post will explain what Microsoft NCE is,…
What Do You Do When an Incident Happens? Disaster has struck! A simple click on an email link, information is given, and your system’s defenses are down. Your company’s security is at risk, and time is running out, and you need an incident response plan. The tension rises, sweat beads and hearts race. What’s your…
Navigating Parenthood in a Digital Age: A Guide to Tech-Savvy Parenting Parenting in today’s tech-dominated world is undoubtedly challenging. The constant tug-of-war between the allure of technology and the pressure to say “yes” can be overwhelming. As parents, it’s our responsibility to safeguard our children, provide guidance, and maintain open communication about digital safety. Remember,…
Details on the 2023 MFA Change Microsoft is constantly striving to improve security and user experience for its Microsoft 365 users. Above all, cybersecurity, data security, and user privacy have been priorities of theirs in recent years. On February 27, 2023, as part of these efforts, Microsoft will be making a change to the way…
Living in a now post-pandemic world has brought about many changes to the way the workplace can function successfully. One of the most prominent changes in this new world is the fact that remote and hybrid work have become increasingly more common. Not only that, but the ability to offer jobs to remote workers has…
When we think about IT, our team’s workstations are not usually the first thing that comes to mind. Yet, they may be one of the most essential components in your IT arsenal. If your team’s workstations are outdated and unhealthy, your business will undoubtedly suffer. It’s essential to maintain a cycle of preventive maintenance…
The world runs on data. It’s what allows your business to continue to grow and deepen its roots in your industry. Without data, consistent growth is impossible. Data can be incredibly powerful for growth, but if not used properly it can also be a hindrance to your business. Understanding your data and asking it…
In the last two years the workforce has transformed. The need for remote access for a multitude of workers is here to stay. This need has changed the way we operate, especially how we rely on network security services. At Advanced Business Solutions it is one of our primary goals to provide comprehensive security solutions…
Ten years ago whenever the topic of cybersecurity was addressed, an image of the hacker in their mom’s basement causing chaos for your data came into view. However, gone are the days where the threats to your security are so simple.
When the topic of Cybersecurity comes up, oftentimes one thinks about the “bigger picture” of what needs to be done to protect your digital assets and those of your clients. When one is working to secure a home, adding in a security camera and an alarm system seem the obvious go-tos. But most often the…
Ever since Microsoft brought us O365 over a decade ago, they have continuously added value to their products through new applications and security features. As a result, last year Microsoft announced their first “substantive price update” since its first release. The price increase applies to these specific commercial products: Microsoft 365 Business Basic Microsoft 365…
Cloud computing, in essence, encompasses every service that can be accessed online anywhere and at any time. Storage platforms like Azure Cloud Storage and customer relationship management apps like Microsoft Dynamics CRM are good examples of the cloud at work. And while businesses have been slowly adopting this service for years, the increasing need to…
Cloud computing, in essence, encompasses every service that can be accessed online anywhere and at any time. Storage platforms like Azure Cloud Storage and customer relationship management apps like Microsoft Dynamics CRM are good examples of the cloud at work. And while businesses have been slowly adopting this service for years, the increasing need to…
This year marks 25 years here at Advanced Business Solutions. From our beginning as the brainchild of CEO Mark Lewis, to establishing the ABS Way, to now serving the throughout the Kentuckiana region, we are thankful for each step and opportunity along the way – it’s been an awesome journey so far. Join us as…
Business and computers go hand-in-hand today. Technology empowers enterprises but that doesn’t mean it’s not complicated. That’s coming from IT professionals! It’s important to have a baseline understanding of the cybersecurity threats facing businesses. However, we want to emphasize that the best way to face a cybersecurity challenge is to have a proactive and comprehensive…
Microsoft announced a new pricing schedule for both Office 365 and Microsoft 365 that is scheduled to go into effect in March 2022. So, if you’re getting started on your 2022 budgeting for IT services in your organization, here’s what you need to know!
Technology changes constantly to keep up with trends and innovations. Thus, IT professionals need to do the same. According to the US Bureau of Labor Statistics, the computer and IT field is experiencing steady growth. Jobs are projected to grow by 11% up to 2029, amounting to around 531,200 new jobs. The growing demand for IT…
Five to ten years ago, businesses used cybersecurity insurance more as a precaution than a necessity. Large payouts for cybersecurity breaches were rare and not significant enough to break the bank, which meant those kinds of insurance agencies were making money and keeping it. In contrast, insurance agencies today are facing financial payout after financial payout because…
Using data to make more informed business decisions is a no-brainer – especially for businesses that already have this data at their disposal. The challenge is that many businesses have this data, they just don’t have a simple way to collect and interpret it. And, without this, they face a major roadblock on their path…
Technology advances everyday, and as it does so do hackers taking advantage of it. Businesses cannot afford to have subpar cybersecurity measures in place. In order to protect your information and save yourself the time, money, and stress that comes with a data breach or other hacking event, you need to have the best plans…
The challenges faced by businesses are constantly changing year to year. Cybersecurity has become a major priority and challenge for many businesses as remote work has become more normative due to the pandemic. One of the biggest issues with cybersecurity is protecting against all forms of attack. There are many ways a business could be…
As the Director for our Technical Account Managers (TAMs), I see the work they do for our customers every day. I think of our TAMs as the “lighthouses” for our customers. They alert the ABS team when something hits their radar. They light the way proactively about future issues and creative strategies.
Much of our day-to-day business relies on computers. We use devices and networks to communicate, work, and store data. With the amount of crucial information stored on our servers, it is no wonder that there are criminals out there who look for ways to access it. Your vulnerabilities can end up costing your business more…
Managed IT Services or Managed Service Provider (MSP) are terms you’ve probably heard thrown out from time to time. Unfortunately, it’s not always clear exactly what “managed” means and how it can benefit your business. If you’re curious about managed IT, what it means, how it works, and why so many businesses are choosing this…
We hear so many terms and services (like remote monitoring) thrown out and, oftentimes, it’s unclear exactly what these terms and services actually mean. As you seek to understand your IT needs and the many ways you can choose to meet those needs, it’s important to understand the pros and cons of each option and…
We’ve been talking a lot about security lately, but there’s a reason for this. We’re not exaggerating when we say you need to prioritize protecting your business. Whether you’re aware of it or not, your business is under constant attack. Many people fall into the trap of assuming their business isn’t worth the time or…
Technology has come alongside businesses and helped some of our most challenging issues – from providing multiple means of communication to helping us create elaborate solutions and intricate designs, technology makes it possible for us to live and thrive in this modern world. On the flip side, technology can cause new issues and create new…
Servers are the lifeblood of any business. This is where your critical information is stored and accessed. As a result, your entire business is affected when you experience an issue with your server. Data loss and downtime are common results of server issues. In fact, an unprotected and unsupported server should be a business owner’s…
The ABS team recently had a chance to take a look back on 2019 and an incredibly special time in our company’s history. This was thanks to DCD Magazine who featured ABS and our new building in their January issue and to Potter & Associates for everything they did to make this new building meet…
The world of technology has grown exponentially over the last decade and, as we head into a new year and new decade, we don’t see this trend changing anytime soon. As a result you and your employees are likely having to adapt and adapt quickly to the ever-changing technological landscape of your business and the…
If you’re a business owner and you’re constantly struggling with the increasing need for and use of technology and the frustrations that can come with it, then you’re not alone. Technology is a blessing and a curse. It can be the best thing that has ever happened for your business and simultaneously cause catastrophic and…
At ABS, we help businesses with day-to-day and long-term technological solutions. This means we help people with the technological constraints that they face daily and seek to proactively develop future technical strategies that will serve them in the future. We’ve been doing this for over 20 years. What we’ve discovered over time is that few businesses are…
Every business is at risk of a cyber-attack – including yours. While some industries are more at risk than others, no industry or business is safe. In fact, one study proved that hackers attack every 39 seconds. If you, your business, and your employees don’t perfectly follow proper cybersecurity measures, then you have a problem. A…
The IT support industry is filled with companies touting the technical certifications and overall “geek”ery of their staffs. But highly technical employees have led, rightly in some cases, to the comical stereotypes of tech support that you see in this short clip!
As the Director for our Technical Account Managers (TAMs), I see the work they do for our customers every day. I think of our TAMs as the “lighthouses” for our customers. They alert the ABS team when something hits their radar. They light the way proactively about future issues and creative strategies.
Multi-factor authentication (MFA) is a method of authentication that requires the use of an additional verification method and adds a second form of security to user sign-ins, transactions, and activity. Office 365 offers MFA for all of their programs and we recommend you implement this feature. Not only does this extra method of verification provide…
Microsoft will be ending support for Windows 7 on January 14, 2020. The move to Windows 10 requires change and we understand the challenge it will be for those who have been using the older operating system for the past decade. This is why we are here to help you with a few tips and…
ABS was founded nearly 25 years ago in founder Mark Lewis’ basement. Over the years, ABS grew from a team of one to now a team of over 100 technology experts. After outgrowing Mark’s home, the ABS team spent 18 challenging yet formative and memorable years at our previous office on Brownsboro Road. It was…
Too many businesses are making headlines for all the wrong reasons. Data breaches are on the rise. Every week it seems as though another organization is announcing that its systems have been compromised and its customers’ sensitive information is at risk. All too often, these data breaches are caused by an employee falling prey to…
As one of the fastest growing IT companies in the region, we are dedicated not only to exceptional customer service but also to the advancement of the community in Louisville and Lexington through technology. On May 23, we unveiled our new 30,000-square-foot office in the Clifton neighborhood, which enables us to continue this mission.
When you think about IT, a stale office environment might come to mind first. While Business IT management is our bread and butter, we’ve also partnered with the community on some unconventional and exciting IT projects. Most recently, we teamed up with some of the staff from the University of Louisville Hospital to support the virtual…
Over the past few years, we’ve seen more government organizations adopt new and advanced technology in some big ways. Ohio, for example, was the first state to start accepting Bitcoin tax payments, and in the 2018 midterms, West Virginia tested out a mobile app for residents serving abroad to remotely cast their federal election vote.
There are many ways you can manage your company’s IT. An internal IT department is great for those who can afford to staff one, but many companies don’t have the resources to do so. In fact, 64% of U.S. businesses work with an IT service provider for some or all of their IT needs. Outsourcing…
At ABS we believe that strategic IT management begins with a proactive mindset and a people-first approach. Our Technical Account Managers (TAMs) are on the frontlines of leading our customers and our team in strategic, proactively managed IT. Our TAM department is made up of individuals who each have a unique skill set. They have…
Digitalization in the workplace has the power to increase operational efficiencies and reduce costs. The shifts around AI, Cloud, Mobility, IoT, 5G, Big Data, and Analytics promise a transformation in the way we all do business — they also require a business’ technology infrastructure to be constantly evolving. How do you keep up? Staffing an…
Technology budgets are expected to grow this year across industries and business sizes. We wrote more about that in a previous blog. In this post, we look at what business tech trends are expected to emerge, which stems, at least in part, from how companies are planning to spend their reported budgets. Businesses of all…
We may not be finance experts, but we do know that IT expenses should be worked into your annual budget. A recent survey, The 2019 State of IT report, was conducted in July 2018 and consists of data collected from 780 business technology buyers from organizations across North America and Europe. The survey details how different sized…
Trust is integral to any business partnership, and when you are outsourcing your IT services it is even more crucial that you have confidence in your service provider’s security and reliability. Empathy is engrained in our company through the ABS Way, and we understand that your data is one of your most important and sensitive assets. That…
At ABS, network and security services are just one way we help businesses avoid technology interfering with their work. Recently we have become aware of a new email phishing scam that appears to come from a financial institution and threatens businesses’ sensitive financial data.
It is projected that global IT spending will reach $3.7 trillion with Enterprise software and IT services as the main leader in the growth for 2018. This is the largest predicted amount since 2007. To give you a better understanding of how organizations around the world are viewing their IT budgets, a recent survey was taken amongst technology professional organizations in an attempt to determine the funding and spending priorities of all departments within the organization.
SIRIS 3 is the newest data protection platform DATTO has to offer and it is also the data protection ABS chooses to use for our clients.With this newly structured version DATTO has created, we are able to offer protection to any physical, virtual, and cloud infrastructure on Windows, Mac or Linux. Clients and users not…
Email spamming has become increasingly relevant as well as extremely convincing. Before opening those emails that flood your email inbox, consider the source and take an extra minute or two to examine the email closely.
At Advanced Business Solutions we offer many services in which bring years of experience, excellence and comfort to many clients ranging from Project Management to Strategic Planning Services. Below you will see an outline and summary of each item we offer and why we are the best at what we do. If there are any questions regarding any one of these items or if more information is desired, please reach out to us today!
Have you ever wondered who your IT company actually is? There are many organizations that have wondered the same. Here are several relevant questions to ask your company’s decision makers about the company you are trusting with important and sensitive information.
February 7, 2018, Apple fought hard to remove a portion of iOS source code that was released and then posted on GitHub. The iOS source code was for a process called “iBoot,” originally reported by Motherboard.
As technology continues to accelerate, it is easy to get lost and overwhelmed with intimidating information. ABS is making an effort to provide you with the latest IT news that could affect you and your organization. As changes are underway to the Microsoft Software Donation Program, many nonprofits will see the difference in the coming…
Do you remember Meltdown and Spectre, the Intel processor vulnerabilities we mentioned a few weeks ago? Well, Intel has recently rolled out a patch for the bugs – but be careful, it doesn’t come without issues. To recap, the Meltdown and Spectre bugs are design flaws that result in a weakened separation in the secure…
In a stunning turn of events, researchers discovered a significant vulnerability in virtually ALL Intel processors. The vulnerability is similar to the Heartbleed bug of 2012. The bug allows normal programs to access the secured memory in the system’s kernel. A kernel is the core of an operating system—and just so happens to be responsible for handling the MOST sensitive tasks carried out by your operating system. Needless to say, this is bad.
While it’s months since the Netflix phishing scam was first reported, unfortunately, it’s showing no signs of slowing down anytime soon. For those unaware, a popular phishing scam targets Netflix users with an urgent email notifying the user that their account has been suspended and requires immediate action.
In what seems to be a never ending cycle of news headlines surrounding data breaches, Accenture, a giant in the tech and cloud industries, appears to be the latest major company to breach client data. Reported as an accident, the company left four of its AWS S3 buckets open to the public, and ultimately, exposed hundreds of gigabytes of sensitive data.
Equifax Inc. (NYSE: EFX) today announced a cybersecurity incident potentially impacting approximately 143 million U.S. consumers. Criminals exploited a U.S. website application vulnerability to gain access to certain files. Based on the company’s investigation, the unauthorized access occurred from mid-May through July 2017. The company has found no evidence of unauthorized activity on Equifax’s core consumer or commercial credit reporting databases.
As covered recently in Louisville Business First, ABS has its eyes set on a new and exciting development in the Clifton neighborhood. The plans for the estimated $3M project would be a huge step forward in terms of growing the ABS team, and continuing a mission of proving top-notch quality service for customers…
The Petya Virus is the newest cyber attack circling the globe and experts believe it to be even more dangerous than other recent threats. The Petya Virus first originated in Ukraine and was thought to be ransomware, but has been discovered to be something much worse. When the attack hits, a message appears on a user’s computer monitor stating that their data is being held until they pay a fee of about $300. In return the user receives a digital key that they are assured will unlock their data. However, unless the user has a recent backup of their data they are often forced to pay the price or lose their files.
Could last month’s WannaCry Ransomware attacks be considered a “warning shot” in the war of cybersecurity? Microsoft seems to think so. On June 13, 2017 Microsoft released new security patches with the purpose of protecting computers from the “elevated risk for destructive cyberattacks.”
If you have a smartphone, computer, or just about any other tech device, you’re all too familiar with push notifications or messages prompting you to update. And whether the update is needed for adding features, fixing bugs, or larger scale program and security improvements, studies from Pew Resarch Center among others show that nearly 50% of people choose to delay updates simply because it’s not “convenient” in that moment. We get it…
When NetShape Technologies (https://www.netshapetech.com/), a global manufacturer and metal components supplier with sites located in North America, Asia and Europe, needed to move their data center, they came to ABS for help. The complex project involved relocating their hardware from Louisville to Chicago as well as implementing and configuring a new Storage Area Network (SAN)—and a smooth transition was crucial to NetShape’s operations.
There has been a recent discovery of a security problem with a portion of Intel’s firmware. The
issue allows hackers to forgo authentication to receive access to the management side of the PC.
This is a real threat because the bug allows attackers to gain full administrative access and view
private data, which can then be exposed to the public.
The Maryhurst Journey of Hope Luncheon held at The Louisville Marriott Downtown on Friday, May 12, was a great opportunity for guests to become, “the hope our children need.” This annual fundraiser has shaped into a tremendous opportunity for Maryhurst to honor their outstanding alumni and benevolent supporters. At the 2017 luncheon, Maryhurst presented numerous scholarships and honored their Alumna of the Year, Tammy Smith. But, most importantly, the Journey of Hope Luncheon focused on Maryhurst’s vision to imagine communities free of abuse and filled with hope for every child and family.
You may have heard the recent news that Louisville, KY has been selected as the latest market for the rollout of Google Fiber, a high-speed internet provider to rival Spectrum/Time Warner Cable and AT&T as the big players in the local area. But, what does Google Fiber mean for Louisville? A few things…
As technology constantly builds and improves over the years, businesses and people alike are having to adapt and grow along with it. In order to keep up with the fast-pace changes, ABS is constantly upgrading its systems and processes in order to provide top notch tools and solutions for its customers. That’s simply the ABS Way.
If you’re like us, you use email on a daily basis to communicate information to clients, colleagues, and friends. But, with any routine, we tend to become a bit too comfortable with it, move faster than we should, and ultimately make some mistakes that may have been prevented just by slowing down and assessing the situation at hand with a clear head.
In order for any business to be successful, making sure the right plans are made and in place are crucial so businesses are able to move forward from any mishaps that could occur. The same can be said in the world of IT as well because as the business grows, their IT infrastructure will need…
ABS Start Date: 2006
Other Experience, Expertise & Interests:
Customer service background in various industries. Tech experience built by climbing the ranks of ABS. Loves to play golf and enjoys cooking.
Compare me to a sea captain.
As captain of the ship, I am fully confident in my crew’s ability to navigate even the diciest waters.
I feel so fortunate to have the life that I do. I love my job on many levels: it gives me a challenging daily focus, provides me with social interaction, and feeds my family. I was raised in California and graduated from UCLA.
When I am not working, I like to exercise and have run over 35,000 miles in my lifetime. I also enjoy traveling. My favorite destination is anything with a sandy beach or Las Vegas during the first weekend of the basketball tournament. I am an avid college basketball fan. Since I wasn’t raised here in Louisville, I can root for Louisville, Kentucky, or Indiana – but my favorite is the Cardinals.
ABS Start Date: 2010
Other Experience, Expertise & Interests:
Enjoys helping our team be more effective and providing an environment that challenges employees to develop. Chili cook-off champion (2018) and father of three. Hobbies include flag football, volleyball, camping, and wrestling with my kids.
ABS Start Date: 2008
Other Experience, Expertise & Interests:
In the time that I’ve been at ABS, I’ve done pretty much everything and that experience has created a great perspective for me to operate with today. I enjoy learning new things and I’m always up for a challenge. In my spare time, I love doing anything outside – hiking, biking, kayaking, backpacking, etc… Anything that involves putting my cell phone away for extended periods of time!