Destiny Bertucci

Destiny Bertucci

Destiny Bertucci, Auvik Network’s Product Strategist, has spent 15 years focusing on IT monitoring and management software, security, networking, and troubleshooting. Destiny has a broad array of certifications and degrees such as Auvik Certified Professional, SolarWinds Certified Professional, Cisco’s CCNA, and CompTIA CIOS and CSIS certifications. She has also worked and advocated towards empowering women in IT and STEAM programs. Destiny joins Auvik from SolarWinds, where she was a Product Manager and Senior Application Engineer.

See more from Destiny Bertucci

article
|
Cybersecurity

Cybercrime Trends and the Economy

It’s no secret that there is a lot of money involved in cybercrime. With McAfee estimating the annual global cost of cybercrime at just under $1 trill
article
|
Cybersecurity

What is Ransomware?

Ransomware attacks are on the rise, with billions in damages. Learn what ransomware is, how it works, and how to defend against it in this comprehensi
article
|
Cybersecurity

What Is Phishing? Insider Risk & How to Prevent It

When it comes to security, phishing is one of any IT team’s biggest concerns—as it targets the weakest link in the security chain: end-users. No matte
article
|
Protocols & Communication

What Else But SNMP?

What does the future hold for SNMP? SNMP isn’t dead, but there’s been a gradual shift to other network monitoring alternatives. Let’s explore.
article
|
Tech Industry

Data Sovereignty: Everything You Need to Know

“What’s data sovereignty? Is it the same thing as data privacy? What about data sovereignty vs data residency?” These are questions that plague many b
article
|
Configuration & Troubleshooting

Cover Your DRaaS: Everything you need to know about Disaster Recovery

Unplanned downtime carries a hefty price tag for enterprises. In 2020, critical server outages cost enterprises on average at least $10,000 per hour,
article
|
Cybersecurity

Beyond Zero Trust: What is Continuous Security Validation?

Your continuous control validation efforts can force you to improve your security controls. In turn, your continuous control validation efforts will n
article
|
Network Management

Government IT Modernization Must Be More than Skin-Deep

The fact of the matter is that modernizing government technology has become a necessity. The COVID-19 pandemic proved just how unprepared, and unsuppo
article
|
Network Management

Preventing Firmware Attacks

Firmware attacks are on the rise. Learn how to defend and prevent firmware hacking.
article
|
Network Management

What’s the Difference Between Observability vs. Monitoring?

Monitoring tells you when something is wrong, while observability provides you context as to why. Let’s look at how they work together to optimize you
article
|
Network Management

How to Monitor Router Traffic: 6 Router Monitoring Tips

Router traffic monitoring gives IT admins real-time insight into any potential network hazards. Here’s 6 router monitoring tips to know to avoid any d
article
|
Network Management

The Importance of Network Documentation

The importance of network documentation becomes very clear when you have to sit down and troubleshoot a network from top to bottom. Or when there’s a

What’s your shadow IT risk factor?

Find out in this free guide and exercise kit.
cover of shadow IT ebook
You will learn:
  • The impact shadow IT has on an organization
  • How to evaluate tools
  • Tips on security
  • A quiz to help you determine the severity of shadow IT in your org
  • Solutions to solve these problems