Our Most Popular Blogs of 2024

Most Popular Blogs of 2024

Dec 19, 2024 by Taylor Krieg

As we wrap up an exciting year, we wanted to take a moment to highlight some of our most popular blogs of 2024. From navigating VMware’s new licensing model to mastering penetration testing, our readers have been eager to dive into the latest trends and best practices in IT management, security, and business technology.

Whether you’re looking for tips on securing decentralized networks, understanding the benefits of proactive IT management, or exploring the world of Microsoft Teams, these blogs have been packed with insights that have resonated most with our community. Let’s take a look back at some of the top reads that kept you coming back for more this year.

Decoding VMware’s New Licensing Model

VMware has rolled out a new, more straightforward licensing model with four options designed to fit different business needs. Whether you’re looking for a comprehensive solution for a larger organization, a simpler option for basic virtualization, or something specifically for small businesses, there’s something for everyone. With this shift to subscription-based pricing (moving away from perpetual licenses), VMware is making its products more flexible and accessible. The new model also includes account classifications to better cater to different customer types, making it easier to find the right fit for your business.

Animated brown dog investigating blue paw prints on the floor with a blue magnifying glass in mouth

Mastering the Maze of Successful Pen Testing

Penetration testing (or pen testing) is a proactive way to strengthen your cybersecurity by simulating real-world cyberattacks to uncover vulnerabilities in your systems. Before you dive into a pen test, it’s important to make sure your foundational security measures—like patch management and firewall settings—are solid. Pen tests can be split into external and internal assessments: external tests focus on vulnerabilities exposed to the internet, while internal tests look for weaknesses within your network that could be exploited by an insider or an attacker who’s breached your perimeter. Regular pen tests help you stay ahead of potential threats and strengthen your security overall.


Securing Your Decentralized Network: Are Hackers Targeting Your Traffic?

Decentralized networks, like blockchain, offer great security benefits but come with their own set of challenges. While your provider handles the infrastructure, it’s up to you to protect your data, which can feel a bit overwhelming. With more potential entry points, there’s always a risk of hackers exploiting vulnerabilities. To keep things secure, it’s important to regularly assess your security, use strong access controls, and stay on top of monitoring for any signs of trouble.

Animated brown dog walking with a blue service cap on its head, a blue flashlight in its mouth and a blue baton attached to a blue belt

Stay Ahead and Eliminate Downtime with Proactive IT Management

Proactive IT management is all about staying ahead of potential issues to keep your operations running smoothly and minimize downtime. This approach includes regular monitoring to catch problems early, conducting risk assessments to spot vulnerabilities, and having solid data backup and disaster recovery plans in place. It also involves training your team to reduce human error. By taking a proactive approach, businesses can improve efficiency, cut costs, and set themselves up for long-term growth.


Choosing the Right Virtual Machine Migration Path: The Who

When planning a migration from VMware, it’s important to carefully consider your options. While the cloud offers flexibility and scalability, it might not always be the most cost-effective solution unless you re-architect your workloads to be cloud-native. Alternatives like Microsoft Hyper-V and Azure Stack HCI provide solid virtualization options, but they can come with their own management challenges. VxRail, on the other hand, offers seamless integration with VMware environments, making it easier to manage and scale. Each option has its pros and cons, so it’s key to assess your organization’s needs and resources to pick the best migration path.

animated brown dog with a blue first place ribbon on collar

Microsoft Teams Breaks Away from Office 365

Microsoft Teams has come a long way and is now a standalone platform, offering a full range of collaboration tools, from chat and meetings to file sharing and task management. You no longer need an Office 365 subscription to use Teams, making it more accessible than ever. This shift allows businesses of all sizes to take advantage of Teams’ powerful features without being tied to a specific subscription plan.


Keeping Your Network Highly Available: Redundancy and Firewall Clustering

Keeping your network up and running without interruptions is essential for smooth business operations. One great way to ensure this is through firewall clustering. With an active-passive setup, one firewall handles all the traffic while the other stays on standby, ready to step in if needed, reducing downtime during failures. On the other hand, an active-active setup lets both firewalls share the workload, offering not just redundancy but also better performance. By customizing your failover systems to fit your needs, you can keep your network reliable and minimize disruptions.

animated brown dog sitting with a blue hard hat and a blue whiskey barrel dog collar.

FortiGate COATHANGER Vulnerability (CVE-2022-42475)

The “Coathanger” vulnerability (CVE-2022-42475) affects FortiGate firewalls and could allow attackers to run malicious code with system-level access. It’s caused by a flaw in the web-based management interface, which could put your network at risk. Fortinet has released a patch to fix this issue, so if you’re using a FortiGate device, it’s important to update your firmware as soon as possible to stay protected. Acting quickly will help prevent potential attacks and keep your systems secure.


Secure Collaboration with Microsoft 365 Managed Services

In today’s connected world, keeping your collaboration tools secure is more important than ever. Microsoft 365 offers powerful features like Identity and Access Management, Data Loss Prevention, and Multi-Factor Authentication to protect your data. But partnering with a Managed Service Provider (MSP) like Mirazon takes it a step further, handling the day-to-day management of security tasks such as configuration, monitoring, and patching. This lets your IT team focus on bigger priorities while ensuring your collaboration platforms stay safe and secure.

animated brown dog sitting up with blue wrench in its mouth and a blue tool belt around waist

Mirazon Paws For A Cause: Our Partnership With WAGS Pet Therapy

We’re thrilled to share our partnership with WAGS Pet Therapy, a wonderful local nonprofit that uses animal-assisted therapy to improve health and well-being. Our journey started with Ferdinand, our Chief Furry Officer, who shows us every day how much joy and comfort pets can bring to the workplace. Through this partnership, we’re helping WAGS with IT support, fundraising, and training new therapy animals. We truly believe in the power of the human-animal bond and are proud to be part of such an impactful cause, bringing positivity and connection to our community.


Read This Before Upgrading to FortiOS 7.6!

Before upgrading to FortiOS 7.6, it’s important to know that FortiGate models with less than 2GB of RAM will no longer support the SSL VPN feature. If remote access is essential for your business, you may need to upgrade to a higher RAM model or switch to using IPsec VPN for secure connections. Affected models include the FortiWiFi “F” Series and FortiGate 40F, 60F, and 61F. Fortinet offers a guide to help you smoothly transition from SSL VPN to IPsec VPN, including tips for SAML integration.

animated brown dog sitting and smiling

Managed Service Provider vs. Internal IT – Which Is Right for You?

Choosing between a Managed Service Provider (MSP) and an internal IT team comes down to what works best for your business. MSPs are a cost-effective option, offering predictable fees, a wide range of expertise, and scalability as your business grows, all while keeping your security in check. On the other hand, an internal IT team gives you direct control, immediate support, and a deeper understanding of your company’s needs. By considering factors like your budget, how much control you want, and the complexity of your IT setup, you can make the decision that fits your business best.


A Comprehensive Guide to Network Discovery Assessments

A Network Discovery Assessment is a deep dive into your network to uncover all the devices connected to it, their configurations, and any potential security risks. This process helps identify issues like outdated software, misconfigurations, or unauthorized devices that could leave your network vulnerable. By finding these weak spots early, you can take action to fix them and strengthen your overall security. Mirazon’s Network Discovery Assessment provides a detailed report with network diagrams and clear recommendations, giving you the insights you need to protect and optimize your network.

Animated brown dog standing and smiling with a blue graduation cap on, holding a graduation certificate

Evaluating A Managed Service Provider: Questions to Ask to Find the Best Provider for Your Business

When choosing a Managed Service Provider (MSP), you want to make sure they’re the right fit for your business. Ask about their pricing, how they’ll onboard you, and the services they offer. It’s important to know they have strong security measures and can handle any industry compliance you need. Get a sense of their experience with companies like yours, how quickly they respond to issues, and what kind of support they provide. Also, check out their technical expertise and which vendors they partner with. Lastly, be sure you understand the contract terms and who you’ll be working with day-to-day. Asking these questions will help you find an MSP that truly meets your needs.


FortiClient RCE Vulnerability (CVE-2024-48788) Affects Multiple Versions

A serious security vulnerability (CVE-2024-48788) has been discovered in Fortinet’s FortiClient Enterprise Management Server (EMS) that could allow attackers to remotely execute code on your system. This issue, caused by an SQL injection in a storage component, affects versions 7.0.1 through 7.0.10 and 7.2.0 through 7.2.2. If you’re using one of these versions, it’s essential to update to FortiClientEMS 7.0.11 or later (or 7.2.3 or later) as soon as possible. This vulnerability is already being exploited, so don’t wait—make sure you apply the patches and protect your systems!

animated dog sitting and smiling with a blue lab coat and stethoscope around neck

Have questions? Reach out to us by calling (502) 240-0404 or emailing info@mirazon.com! We’re proudly based in Louisville, KY, serving clients nationwide. Whether it be Security Awareness Training, Managed IT Services, or other forms of IT support, we’ve got you covered.

Press enter to search