Machine Learning (ML) is the one of the latest IT trends
being touted by companies like AWS and Microsoft – its applications are many,
from predicting in which animal species new Coronaviruses...
In this article we provide a reality-check on the
migration process and the areas where companies can quickly get into trouble.
We will identify best practices and how to plan for your...
IT Infrastructure Projects and Web Applications that improve your Business/ROI can be enhanced by using the DevOps approach. Many SMB’s face obstacles such as lack of experience within their IT...
Whether you are new to
Cloud or have existing workloads already deployed it never harms to review
Security – an area that evolves constantly as the threats around us change.
Due to the...
For organizations that need to reduce costs or even
close down (“hibernate”) their environments for a certain time – the cloud
offers the advantage of “elasticity” when correctly architected. With legacy
systems you...
Introduction
From March 2020 the operating world of SMB’s has
changed in a fundamental way. They can now be closed- down by governments at a
moment’s notice, staff asked to work from home...
Lucrodyne is an “Essential” Cloud Infrastructure
and Security Provider – you can still contact/call us.
Categorised as an “essential business” Lucrodyne is
continuing to work through this lockdown with clients ranging from...
AWS releases a public preview for Linux- based Bottlerocket. This new feature is the new open-source (OS) for hosting containers on virtual machines or bare metal hosts in the cloud....
Governments are at-risk for ransomware attacks because they aren't doing enough to protect themselves from malware. In fact, Emsisoft estimated that there were about 948 ransomware attacks for 2019, on...
Join our webinar to understand the evolution of the MSP and how SMB’s can benefit.
In this webinar, we compare the Legacy MSP vs Next Generation MSP including:
Comparing day to day...
It is difficult for businesses to manage and secure IoT devices because they are all different from each other. Businesses can secure their IoT devices by implementing a security plan...
Fileless attacks make it easy for hackers to exploit software vulnerabilities, harm malicious payloads, and hide in memory. When this happens it minimizes or eliminates traces of malware on disk,...
Cloud-native software and Kubernetes are both increasing in demand by businesses. In fact, the Cloud Native Computing Foundation (CNCF) survey discovered that 84% of companies are using containers and are...
Canada is considered one of the top six most cyber secure countries in the world, according to Comparitech's 2020 cybersecurity rankings. The top six countries are Denmark, Sweden, Ireland, Germany,...
Azure's public preview of Backup Reports is now available for customers. Backup Reports allow customers to utilize Azure Monitor Logs and Azure Workbooks all in one place, to track usage,...