What is Business Continuity and Why is it Vital?
Whether you have 5 employees or 5,000, you want sustained uptime. That means the infrastructure that houses your company’s most critical data and the people who run it are invaluable, regardless of size. Do your employees know what to do in the event of an emergency? No matter how many of them do, a business […]
Three Key Considerations Regarding Network Security
Now more than ever, the concern of network security should be one of the top priorities of small business owners. With accounts of unsuspecting startups devastated by cyber attacks becoming more and more common, network security is a concern that can no longer be ignored. Three Key Considerations Regarding Network Security: 1. Smaller doesn’t necessarily mean safer. Although some businesses […]
The Latest E-Mail Scams Target CEOs and Cost Businesses Billions
It seems you’re always reading about a new email scam every week that fools office employees. Some of those, however, have a lot of clues now that indicate they’re phishing scams. In that regard, employees are a little more on guard on catching email scams while working. Yet, the creators of those emails are always finding new […]
SANS Policy Templates: Clean Desk Policy
The SANS Institute has published several information security policy templates describing best data security practices in template format. This largely means that you can ‘fill in the blanks’ when developing a security policy (although some modification will be in order for your specific circumstances). In this post we’ll look at the SANS template for developing […]
IBM Servers
As small, medium and large enterprises have increasingly complex storage, data and network needs, they continue to invest in more sophisticated servers. An IBM server provides a cutting edge solution with extremely powerful, reliable service. A typical IBM server has either 8, 10 or 12 cores with 2 all the way up to 16 terabytes of memory. […]
Email Security: Five Tips to Protect Yourself
E-mail can be a terrific form of communication for keeping in touch with family, friends, and business associates. However, using it unwisely may make you and your computer susceptible to spam, scams, and viruses. Here are five tips to avoid these problems: Utilize Security Software A decent security program with a firewall should be your first […]
6 Disasters Likely to Impact Your Data Center
Mitigating risk is a good practice for any business. When it comes to protecting your IT infrastructure, it’s as mission-critical as the data and applications it powers. Though downtime can arise from multiple seen and unseen factors, in a third of cases (33.9%) it can be attributed to one cause: natural disaster.But which are the […]