Introducing DarcyIQ — our AI platform built to help teams move faster without sacrificing quality Explore DarcyIQ →

Innovative Solutions and IBM Collaborate to Bring IBM Software to Customers via AWS Marketplace

Innovative Solutions to open new office in Boca Raton, Florida with professionals skilled in watsonx to support expanded collaboration ROCHESTER, N.Y. (May 6, 2024) – Innovative Solutions today announced an expansion of its collaboration with IBM to bring Generative AI (GenAI) solutions, AI-infused managed security services, and an AI-infused observability platform for cloud-based applications and […]

Breaking Down Multi-factor Authentication

There are the three factors that you have to choose from when protecting your systems and data.   Those factors are: Traditionally, we all have been using just the something you know factor with our usernames and passwords that we use day-in and day-out.  The problem with only using this method in various situations such as […]

Getting You on the Correct Path with Cybersecurity Policies and Procedures

By now, I imagine you’ve been facing pressure from either an auditor, regulatory body, or even a customer saying that you need to have a ‘Cybersecurity Policy’ in place.  There is very little to counter that argument. Square, meet Round Hole There will always be common aspects of a security policy that are necessary to […]

Why You Need A Risk Assessment and Where You Should Start

A common question that I am always asked is “Why do I need to have a risk assessment?”  The answer will forever and always be the same: Because you don’t know what you don’t know. Now, risk assessments can be an intimidating process and sometimes even feel over-whelming.  You just have to remember that the […]

Is email phishing just an I.T. Issue?

Look at any news source today and you are bound to see yet another article on how Phishing is affecting businesses of all sizes in the U.S. and overseas.  With the amount of money that is being spent on protecting networks and end points, why is phishing such an easy way to disrupt operations or […]

Everything You Need To Know About The WannaCry Ransomware Attacks

On Friday, May 12, a ransomware variant titled “WannaCry” infiltrated several UK-based National Health Service locations. Since then, it has spread across 200 countries and infected more than 200,000 endpoints. Three WannaCry Facts You Should Know Fact 1 WannaCry is a ransomware variant that leverages a known Microsoft SMB vulnerability (EternalBlue). Targeting unpatched Windows operating systems […]

Cyber security: How to thwart 2017’s biggest threats

Each year, hackers and thieves find devious new ways to compromise your information technology. Innovative Solutions has been on the case for years, and we’ve helped dozens of clients guard against increasingly sophisticated cyber attacks. Often, a business knows they need to take decisive action, but they’re not sure where to start. So this year, […]

Higher Ed Information Security 101

A byte-sized course in data protection for college administrators It’s a long-held mystique: colleges and universities are often seen as secure, self-contained worlds free from the kinds of risks facing other sectors, like corporate America and government agencies. But when it comes to information security, campuses everywhere have extraordinary challenges. From compliance with regulations like […]