Twenty years ago the IT department knew and cared about one thing: your device – a desktop computer.

Oh, yes, the users would come and go as job responsibilities changed, people were hired and fired, someone moved offices. But the computer stayed where it was, a simple and anchored device.

old computer

Fast forward to today.  With the number of devices used on and off the job, that model has been turned on its head. It is easier to keep track of a user, rather than the numerous devices he/she uses.

I have five – how about you? Over any 24-hour period I might use one or all, depending on what I’m doing, where I’m doing it, ease of connection, or who I might be working or talking with. (Count along with me: Surface, IPad Touch, IPad, my smart phone and Windows desktop. I know, I know, some duplication but some things just get piled up.)




So this begs the question: what do I do for identity and access management? More importantly, what does my company do to deal with this revolution so critical company data is protected? How can anyone possibly set up a perimeter of protection when they can’t be sure where users will be, what devices or networks they will be using, or what applications will be importing the data? How do you keep your most important systems safe from theft and tampering?

The stakes are high. In the on-premises era, a company could muddle through knowing that perimeter defenses like firewalls and VPN would cover the gaps in security. But with the growth of virtualization, hybrid cloud connections and mobile technology, the sense – and reality – of security is gone. As data flows back and forth between company systems and public cloud resources, online attackers have been able to poke holes in the defenses and cause breaches.


Security concept: Lock on digital screen, contrast, 3d render


As always, the weakest link is the user and his/her digital identity. Research shows more than 60 percent of data breaches stem from the theft of digital identities. And as people log into company data from a smartphone or tablet from anywhere in the world, the worries rise. So here are two guiding questions:

  1.  “How do we ensure that the users of new technology get access when they need it AND be restricted from access when the organization requires it?”
  1. “How can we empower users to work as they like, where they like and from what device they like – not limited by location, device or application?”

We here at Applied Tech have insights, experience and ideas on ways to solve these sticky problems. We understand that not all companies and accounts are created equal. Talk with us about how we can you can step up your levels of security based on the risks posed by your business, the users and types of data that can be accessed. This can’t wait.

The Resource Hub

Get Complete Managed Services Insights

Visit our Resource Center for up-to-date news and stories for technology and business leaders.

Employee Spotlight: Nick Tesi

Employee Spotlight: Nick Tesi

This month we are shining a spotlight on one of the outstanding members of the Applied Tech team, Nick Tesi. Nick brings a wealth of experience and a diverse skill set to his role, making him an invaluable asset to our organization. Nick’s journey to his current position as vCIO and Account Manager at Applied Tech is nothing short of remarkable. His career path has included various roles such as...

Password Managers: Simple, Necessary Protection For You and Your Business

Password Managers: Simple, Necessary Protection For You and Your Business

The standard internet user will access several websites and applications on any given day. Each one of these different accounts will highlight the importance of not repeating passwords, and many even require a combination of letters, numbers, and symbols. The trouble with this, however, is that if we were to have a unique password for each online account that meets the complexity requirements,...

Employee Spotlight: Tyler Chatterton

Employee Spotlight: Tyler Chatterton

This month, we are proud to shine the spotlight on Tyler Chatterton, a valued member of the Applied Tech team serving as a Marketing Specialist. Tyler’s journey into Applied Tech was paved by his roles as a Digital Marketing Specialist and later as a Digital Marketing Team Lead at the Wisconsin Innovation Service Center. These experiences not only honed his skills but also seamlessly prepared...

Applied Tech Achieves Remarkable MSP Rankings in Wisconsin and Colorado

Applied Tech Achieves Remarkable MSP Rankings in Wisconsin and Colorado

Denver, CO – August 2023 – Applied Tech emerges as a true standout, securing the #2 MSP ranking in Wisconsin and #3 ranking in Colorado in the 2023 Channel Futures MSP 501 list. This remarkable recognition underscores Applied Tech’s unwavering commitment to delivering cutting-edge managed and co-managed IT services and cybersecurity solutions. The Channel Futures MSP 501 list stands as a beacon...

Three IT Service Techs Working

Move Forward with IT Services for Business

Use managed services for small and mid-sized businesses that help you reach your goals.

Work With Us