Blog Archive

Cloud/Data Security – The Need to Prioritize

The Pressure Facing Today’s CISOs Data protection and cybersecurity are more complex than ever—rising threats, mounting compliance demands, limited budgets, and fragmented infrastructure are forcing security leaders to make tough choices. It’s no wonder the average...

PTP Gives Back: Norwood Food Pantry

The Pinnacle Technology Partners (PTP) teams in Norwood, MA and Cincinnati, OH continued to deliver on the PTP goal of making an impact in our communities and giving back to our fellow community members. Our HQ team in Norwood, MA supported the Norwood Food Pantry by...

Living the Cloud Life: Welcome to Our New Office Space

The adoption of the public cloud is not only changing how IT consumes technology, but it’s reshaping how businesses think about real estate. Or at least—it should be. One of the most visible impacts of cloud services has been on commercial real estate, especially the...

Trade Tariffs May Be the Tipping point In IT Consumption Models

Trade tariffs are significantly impacting IT consumption models, driving up costs and causing supply chain disruptions. Businesses are re-evaluating their approaches, shifting towards flexible, scalable, cloud-first solutions to mitigate these issues. A cloud-first strategy can help organizations avoid price increases and ensure project timelines remain unaffected by hardware availability constraints. By leveraging public cloud solutions, companies can regain control over their IT infrastructure, reducing reliance on traditional hardware vendors and safeguarding budgets against political trade skirmishes.

Top 25 Reasons NOT to Work with PTP!

1. Technologies can implement themselves, expertise is not required. 2. Preference to a transactional relationship with a vendor. 3. Don’t value expertise of leaders that have built and led successful customer-centric businesses. 4. Because bigger is always better. 5....

Protecting Your Network from the Latest WPA1/WPA2-PSK Vulnerability

Stay ahead of the latest WPA1/WPA2-PSK vulnerability affecting wireless networks. This vulnerability, highlighted by the Hashcat project, targets networks using WPA1/WPA2-PSK, allowing attackers to obtain the PSK. Our event provides insights into identifying and mitigating this threat using Meraki’s advanced tools. Ideal for IT professionals in biotech and life sciences, this session will help you secure your wireless network, ensuring robust protection against evolving cyber threats.