Blog

Planning for Disaster Recovery

Planning for Disaster Recovery

We hear in the news every day about natural disasters such as fires, floods, storms and even earthquakes, and know the damage they cause. But what about the potential consequences for your business? What if your business stays closed for a period of time, and loses revenue because your information systems are unavailable? Or if a cyberattack occurs that results in a data breach that compromises your business’s reputation? Read on to learn more about how to make a disaster recovery and business continuity plan.

What you Need to Know to Comply with  Global Data Protection Regulation

What you Need to Know to Comply with Global Data Protection Regulation

You don’t need to be based in the European Union to be subject to the new Global Data Protection Regulation (GDPR) scheduled to take effect in May of 2018. These broad standards for compliance protect the data of any EU citizen regardless of where the data resides. You will want to know how to avoid fines as high as 4% of your total global revenue. In fact, reading this article may help you demonstrate compliance by educating yourself. Even if your company may not need to comply, GDPR enforces best practices in data protection, so read on.

What’s in Your Data Center?

What’s in Your Data Center?

Most experts agree we will create more Data this year than in all prior years combined. According to research firm IDG the world will create 163 zettabytes of data a year by 2025. It is no surprise IDC forecasts worldwide spending on public cloud services and infrastructure to reach $122.5 billion in 2017, an increase of 24.4% over 2016. What is driving this growth and what do you need to know to manage what’s in your data center?

The IoT Security Challenge

The internet of Things (IoT) is much-talked-about technology. Driven by low-cost sensors, ubiquitous connectivity and updates to the Internet Protocol (IP), IoT is rapidly being adopted. Research firm Gartner expects over 8 billion devices connected in 2017. Cities use IoT to relieve parking congestion by collecting data on open parking spots; farmers can measure moisture in soil; and manufacturers use this technology to track inventory in their supply chain. Because these devices may use machine-to-machine connectivity without human intervention, this can increase the IoT Security Challenge. Here are some security considerations for IoT.

Archives

Share This