Learning & Resource Center
Free security network assessment
Most Popular Posts
Posted by Royal Hansen, Vice President, SecurityBlack History Month may be coming to a close, but our work to build sustainable equity for Google’s Black+ community, and externally is ongoing. Currently, Black Americans make up less than 12% of information security analysts in the U.S. In an industry that consistently requires new ideas to spark positive change and stand out against the status quo, it is necessary to have individuals who think, speak, and act in diverse ways. Diverse security...
Microsoft listed as a Representative Vendor in 2020 Gartner Market Guide for Insider Risk Management Solutions
While organizations have long prioritized external cybersecurity risks, many have not paid enough attention to the risks posed by trusted insiders in their organizations. This is a mistake. Insiders often already have access to sensitive data, and the risks, whether malicious or inadvertent, can potentially cause greater damage than external cybersecurity risks. Two years ago, after a conversation with our Chief Information Security Officer (CISO), Bret Arsenault, we embarked upon an...
For most small businesses, the chances of falling prey to a long-term covert surveillance operation by well-resourced, likely state-backed actors are slim. To recap, that is what the evidence suggests happened in the SolarWinds compromise discovered last December. Many believe the company’s Orion update was used to conduct cyber espionage for months prior to being discovered. However, data shows the time to detect a data breach for businesses averages 280 days, according to research conducted...
Buzzwords and acronyms abound in the MSP industry, an unfortunate byproduct of marketing years in the making. Cybersecurity is a hot watercooler topic at any business. Well, now probably more likely a virtual happy hour than a watercooler, but nevertheless cybersecurity remains top-of-mind. To sleep at night, MSPs feel they must enhance or expand their security offerings beyond the standard layers, like; firewalls, firewall filtering, active directory protocols, DNS Filtering and...
The recent Solar Winds attack is a moment of reckoning. Today, as we close our own internal investigation of the incident, we continue to see an urgent opportunity for defenders everywhere to unify and protect the world in a more concerted way. We also see an opportunity for every company to adopt a Zero Trust plan to help defend against future attacks. The Microsoft Security Research Center (MSRC), which has shared learnings and guidance throughout...
Most people would categorically agree that increased privacy online is a good thing. But in practice, questions of privacy online are a bit more complex. In recent months, you’ve likely heard about DNS over HTTPS, also known as DNS 2.0 and DoH, which is a method that uses the HTTPS protocol to encrypt DNS requests, shielding their contents from malicious actors and others who might misuse such information. It can even address several DNS-enabled cyberattack methods, such as DNS spoofing or...
Cybersecurity professionals find themselves in high demand as organizations worldwide continue to grapple with how to secure millions of remote workers. James Turner is an industry analyst at CISO Lens and served as an adjudicator from 2017 to 2019 for the Australian government’s cyber war games: Operation Tsunami. In this episode of Afternoon Cyber Tea, James and I talk about how the COVID-19 pandemic has accelerated the critical need for cooperation across the cybersecurity industry, as well...
In today’s rapidly evolving cybersecurity landscape, the battle for privacy and security is relentless. Cybercriminals are masters at using technology and psychology to exploit basic human trust and compromise businesses of all sizes. What’s more, they often hide in plain sight, using both covert and overt tactics to cause disruption, steal money and data, and wreak havoc with MSPs and SMBs. While cybersecurity advice is often focused on technology like endpoint protection, firewalls and...
The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest post from our new Voice of the Community blog series, Microsoft Product Marketing Manager Natalia Godyla talks with Dave Kennedy, Founder and Chief Technology Officer at Binary Defense. Dave shares his insights on security operations—what these teams need to work effectively, best practices for maturing the security operations center (SOC), as...
While we can all rejoice that 2020 is over, cybersecurity experts agree we haven’t seen the last of the pandemic-related rise in cyberattacks. Throughout the last year, we’ve seen huge spikes in phishing, malicious domains, malware and more, and we don’t expect that to slow down. As employees around the world continue to work from home, 2021 is shaping up to be another year of record highs in terms of malicious online activity. What is the cyber-demic? Cybercriminals have always been...
The supply chain attack that Trojanized a SolarWinds update to infect and spy on the IT management platform’s customer base continues to be analyzed. Early reports have called the methods highly sophisticated and the actors highly trained. We do know that IP addresses, a command and control server and a malicious product update file were used. While details continue to come to light with further investigation, one thing is clear has been made clear by the incident: the fundamental elements of...
The corporate network perimeter has been completely redefined. Many IT leaders are adopting a Zero Trust security model where identities play a critical role in helping act as the foundation of their modern cybersecurity strategy. As a result, cybercriminals have shifted their focus and identities are increasingly under attack. In this infographic, we explore how this shift is affecting IT leaders and how Microsoft can help apply threat protection to...
From the global pandemic to recent cyberattacks, our world has faced many challenges during the past 12 months. Some of these challenges we can’t change. However, I’m pleased about the ones we can, and are changing across the cybersecurity landscape. For example, to facilitate remote work and maintain business continuity, organizations are moving more of their apps to the cloud and delivering SaaS experiences. We know, however, that cybercriminals are taking advantage of this shift. We have...
From March to December 2020, we tracked segments of a dynamically generated email infrastructure that attackers used to send more than a million emails per month, distributing at least seven distinct malware families in dozens of campaigns using a variety of phishing lures and tactics. These campaigns aimed to deploy malware on target networks across the world, with notable concentration in the United States, Australia, and the United Kingdom. Attackers targeted the wholesale...
When I outlined the five identity priorities for 2020, the world was a very different place. Since then, the COVID-19 pandemic has forever changed how organizations run their businesses. It’s also changed the way we work, learn, and collaborate. What hasn’t changed is the critical role identity plays in helping organizations to be secure and productive. Yesterday, we shared the progress we’ve made with our integrated security, compliance, identity, and management solutions. Identity alone has...
Tune In to Our Latest Videos
Frequently Asked Questions
How soon can you start?
Usually we are able to start the on-boarding process the next day after we get an approval from our client. Depending on your specific case the on-boarding can take from 1 to 4 weeks.
How long does it take to speak with IT System Administrators?
We offer 24/7 support. If an emergency problem arises, we respond to our clients’ support needs, including on weekends. If it is a non-urgent service request, our client coordinators will open a ticket and a follow up will be made during normal business hours 8:00AM-5:00PM. On average our response time is 5 minutes. Our IT systems administrators are extremely fast at replying to emails and talking calls.
Do you monitor systems 24/7?
Yes, our IT support system administrators and network monitoring systems watch over the network 24/7 and identify issues before they turn into bigger problems. We identify and monitor all mission critical systems and applications for our clients.
Do your technicians maintain current vendor certifications?
Yes, our Systems Administrators hold various industry certifications and are required to keep their technical skills current through on-going training.
Do you require contracts?
No, we do not require service commitment time period in order to provide services.
What are Managed IT Services (MSP)?
Managed IT services are the practice of outsourcing a company’s IT support needs to a third party organization that specializes in these services. It is a pro-active approach to managing the IT infrastructure of any company that has more than a handful of computers. Organizations usually delegate IT operations to Managed IT Service Providers (MSPs) to address those types of responsibilities. This model is an alternative to the more reactive, break-fix or on-demand outsourcing model. InVision Technology Solutions offers 4 different Managed Service Plans along with break-fix options for small and medium sized companies in the Phoenix Metro area.
Can I get a quote over the phone?
Yes, we can provide an estimate based on your current infrastructure. We need to collect some information about your company and we can give you an estimate over the phone. This process usually takes about 15 minutes.
Do you have written, guaranteed response time?
Yes, we guarantee a 1hr response time for all our managed service clients, however usually it is less than 10 minutes. It is written in our service agreements.
Do you keep track of IT inventory?
Yes, for clients on our managed service plans, we have developed a system which provides detailed information about their IT infrastructure for all systems covered by their plan, including all digital and physical assets.
Are your IT technicians US based?
Yes, all our IT consultants are in the Phoenix Metro Area. Every client has two dedicated engineers assigned and they are all based locally
What People Are Saying
After searching for months for a full-service IT solution and support provider, we found InVision Technology Solutions four years ago. Since that time, InVision, and its President, Sandra Juarez, have helped improve the many facets of our IT infrastructure, accommodating company growth, and in a manner that provides excellent service and protects our Company. InVision employees are knowledgeable, staying up to date on the ever-changing IT industry and, overall, its services fit well within our Company budget. I highly recommend InVision Technology Solutions as a full-service, IT solution and support provider.
As a medical practice, we heavily rely on technology and quick access to our data in order to provide the best care to our patients. Since we hired InVision Technology Solutions, over 10 years ago, we felt like we finally could focus entirely on patient care rather than being distracted by constant IT issues. They are reliable, professional and knowledgeable. Not only they address issues at hand, but they anticipate, prepare and address potential IT threats before they can hinder our operations.
Free security network assessment
We're Here To Help!
19820 N. 7th St., Suite 110
Phoenix, AZ 85024
14362 N. Frank Lloyd Wright
Scottsdale, AZ 85260
M-F: 8am - 5pm