IT Assessment Virginia - Computer Network Service Virginia

EternalRocks worm combines seven leaked NSA attack tools

Hard on the heels of the WannaCry ransomware attacks, a researcher has found a worm that combines four NSA exploits and associated attack tools, including EternalBlue used by WannaCry

Agile unlocked: Pivotal uses paired programming and PaaS to bolster cloud app development

Digital transformation consultancy Pivotal explains how paired programming, an empathetic work culture and open source PaaS help enterprises achieve their agile software development goals

Only 9% of parents want kids to be tech entrepreneurs

Study shows UK parents would prefer their children to have a traditional job such as doctor, teacher or lawyer

Dutch railway uses IoT to reduce people jams

Railway stations in The Netherlands are monitoring the movement of travellers to manage traffic flow and reduce people jams

Security Think Tank: Malware is sneaky

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

HSBC voice authentication tricked by twins

Twin brothers managed to trick HSBC’s voice recognition security system into giving account access to the wrong person

Middle East largely unscathed after WannaCry cyber attack

The impact of WannaCry on the Middle East was reduced due to the attack falling on a weekend, but it is a stark warning

Windows 7 accounts for most WannaCry infections

Statistics show that computers running Windows 7 accounted for the biggest proportion of machines infected with the WannaCry ransomware, while NHS suppliers are blamed for hampering patching by NHS trusts

Denmark's Spar Nord bank in app dispute with Apple

Danish bank Spar Nord considers legal dispute with Apple over the supplier’s rejection of mobile app

McAfee researchers test WannaCry recovery method

Although there is evidence that some victims of the WannaCry ransomware attack on 12 May have paid the attackers, there is no evidence that they are getting their data back

Manx Telecom streamlines its business with VMware NFV

After deploying an NFV platform to replace its IMS service, Isle of Man-based telco has seen substantial improvements to its business agility and processes

WannaCry ransomware attack should push hospitals to gauge certain tech

The WannaCry ransomware attack affected hundreds of countries and hundreds of thousands of systems, including health systems. Experts discuss what healthcare orgs need to do.

Command and control communications key to detecting threats

Malware command and control (C&C) communications are key to detecting advanced threats, according to a security researcher

How to simplify IT integration

Pressure on IT is mounting and point-to-point integration does not scale. Opening up APIs is one of the approaches now being considered

Interview: Claude Moraes, MEP and EU Civil Liberties Committee chair

Claude Moraes, chair of the European Parliament's Civil Liberties, Justice and Home Affairs Committee shares his views, concerns, reservations about EU-US data transfers, encryption and Brexit

Microsoft to open African cloud datacentre region in 2018

Software giant plans to capitalise on business demand for its cloud services in Africa by offering users access to locally hosted Azure and Office 365

Neustar launches international security council

Sharing information in the face of threats such as WannaCry is crucial for organisations to improve their cyber security capability, according to Neustar, which is making it easier to do

Brits expect driverless cars to outnumber normal cars in 15 years

Survey shows 42% of people think autonomous vehicles will make roads safer, but 46% admit they would not feel safe as a passenger in a driverless vehicle

Cloud provider snubs SAN for StorPool hyper-converged infrastructure

Coreix found costly SAN capex outlays too onerous so opted to build its own hyper-converged infrastructure from StorPool storage software and SuperMicro x86 servers

Interview: Mark Potter, CTO, HPE

The head of Hewlett-Packard Labs speaks to Computer Weekly about a new era of computing, where memory is no longer a constrained resource

IT Assessment


Years of accumulated experience have afforded us the ability to evaluate a company’s IT quickly and comprehensively.  We can examine all your critical software/hardware areas, compare them against proven systems, and provide you with a clear path to improving your business’s IT in a thorough yet timely manner.
 
You’ll be provided with a detailed Information Technology Assessment (ITA) report that will give you an idea of your current system’s effectiveness.  For any areas needing improvement, we’ll provide you with careful, detailed suggestions that will be ranked in order by priority.
 

And your grade is…
 
At TCB, we use a grading system that accurately measures every critical function of your IT and then compiles the results into a series of straight-forward graphs.  These results will grant you invaluable perspective into which IT areas are working well and which ones need improvement.  The combined score of each section reveals your Network Health Index, which over time can be used to objectively track the enhancements we can offer your network infrastructure.
 
 
Based upon what?

Our grading system examines these IT areas:
• Technology Management — including planning, support and documentation
• Network Topology — including design, cable plant and Internet connectivity
Network Security — including firewall, perimeter, physical and wireless security
• Server Infrastructure — including hardware, operating systems and storage
Network Services — including directory services, administrative policies, remote access & redundancy
• Network Applications — including communication, collaboration and financial management
 
 
What actually happens…

Our ITA service is a comprehensive, multi-step process which includes:
 
• On-site consultation
• On-site data collection
• Report preparation (including an executive summary with your specific Network Health Index, data analysis, best practices, recommendations and budgetary information)
• Presentation meeting