Firewall Breaches in the Bring Your Own Device Era
At its most basic, a firewall is a network security system that controls incoming and outgoing network traffic. A firewall analyzes data packets and makes a determination as to whether they should be...
View ArticleThe Main Cause of Network Outages and How to Prevent It
Network outages are disruptive and expensive. An IvyTalk Connect Application Note from 2012 presents the following eye-opening statistics about outages: IEEE says that 49% of network outages are caused...
View ArticleHow Regulatory Compliance Affects Security Configuration Management
Information technology managers today face many challenges due to industry standards like the Payment Card Industry Data Security Standard (PCI DSS), and regulations that are federally mandated, such...
View ArticleThe Vital Role of Network Configuration Backup in Protecting Your Data
Everyone knows how critical backing up data is. But simply backing up your organization’s data is not sufficient to protect it. You not only want to ensure you are able to recover data should a server...
View ArticleUS Rolls Out New Office of Technology Research and Investigation
As big data and the Internet of Things (IoT) become the primary driving force of today’s business, the Federal Trade Commission (FTC) is looking for new ways to address privacy and security concerns...
View ArticleIs Your Business Up to the New EU Compliance Regulations?
Businesses operating within the European Union are not the only ones that need to be concerned with the upcoming EU Data Protection Regulations. These regulations will also apply to companies outside...
View Article4 Things You Need to Know About Compliance Issues Today
Regulatory compliance — it’s in the trade journals, major business magazines, and industry blogs. Yet lots of advice doesn’t always translate into a full set of knowledge when it comes to such a vast...
View Article5 of the World’s Worst Software Bugs Ever
Computer bugs can be embarrassing, costly, time-consuming, and frustrating. But these examples prove that they can be much worse than you ever imagined. Here are the worst computer bugs in history,...
View ArticleBackups, Redundancy, RAID, and Your Network
Every industry has jargon — special words that mean something only to those knowledgeable about that industry. Most industries have used more or less the same terms for years, many for decades or even...
View ArticleFinding That Elusive Balance Between Mobility and Security
Businesses are well aware of the need for workforce mobility. A mobile workforce gets more done, is able to produce virtually anytime and anywhere, and is theoretically happier doing their jobs. But IT...
View ArticleHow Can You Be Sure You’re Partnering With the Right Cloud Backup Vendor?
Cloud backup vendors are a dime a dozen, it seems. How can you be sure that the one you’ve chosen to partner with is offering you the best you can get for the most reasonable price? Here are some...
View ArticleWhy the Cloud is the Safest Place for Your Backups
Astoundingly, between 75 and 90 percent of all businesses do not have a backup plan that is adequate to restore their systems if a significant disaster happened. Many businesses consider the relatively...
View ArticleYour Survival Guide to the Advanced Persistent Threat
An old movie quote goes, “It’s not paranoia if they’re really out to get you.” Such is the case with the Advanced Persistent Threat (APT), or any given cyber security threat these days. They are out to...
View Article9 Cyber Security Sins That Can Get You Fired
The very nature of IT jobs is that they come with a regular set of goofs and boo boos. Most mistakes are benign or are easy to recover from, and few are grounds for firing. Otherwise, there would be...
View ArticleGone Phishing: How the C-Level Exec Rocks the Cyber Security Boat
When you think insider threat, you probably visualize the worker who got fired for missing 11 straight days of work and then threw a temper tantrum in the hallway when informed that they no longer had...
View Article5 Cyber Security Sins That Can Get You Fired
IT folks aren’t exactly rare, but really great ones are. With every business from Mom and Pop’s Supermarket to the Fortune 100 guys looking for educated, skilled, talented IT personnel, those who know...
View Article9 Things Your Business Needs to Know When Selecting a Foreign Backup Vendor
Perhaps you’re a US vendor looking to contract with a backup provider in Europe. Or, maybe you’re a UK company considering a backup solution based in Canada or Asia. What do you need to know? There are...
View ArticleIs Your Organization Prepared to Manage, Back Up, and Store Zettabytes of Data?
If predictions by the experts are true (which, by every indication, they are spot on), the time to plan for a massive, humongous, tremendous, exceedingly large influx of data is now, if not sooner. The...
View ArticleThe Privacy Battle Rages On: Lawmakers Attempt to Force Vendors to De-Encrypt...
If you watch many crime fighting shows, it’s easy to get the impression that the FBI and law enforcement agencies (especially those in the big cities like New York and Los Angeles) have arsenals of...
View Article