Category: Knowledge

How to Handle a Data Breach

When a breach happens, how you proceed and the actions you take will help mitigate the impact to your bottom line. The type of information stolen generally dictates the seriousness of the entire situation. Back everything up fresh. Treat it like a police crime scene and preserve the evidence. Logfiles, configuration files, and affected data.… Read more »

How to Prevent Data Breaches

The question “How to prevent data breaches?” is similar to ‘how do you prevent car break-ins?’ Cars are still very easy to break into. Their windows are not made of steel. However, you can make the hassle and risk of breaking into the car outweigh their desire to get inside. Keeping money, valuables out of… Read more »

What is Hacking and How it Impacts You

The word “hack” gets used a lot these days and appears to have a few meanings. Every day in the news another organization announces they were hacked. A friend’s twitter account is hacked. Government systems are breached. What does it mean to be hacked? When used in terms of computer security, “Hack” means to gain… Read more »

What can VPN connectivity mean to a multi-site organization?

You keep data on your business, employees, and customers. That data is a valuable to more than just you. Corporate espionage costs businesses worldwide over $500 billion a year. Keeping that data safe can be tough even with only one location. So when dealing with multiple sites requiring secure communications, the complexity is magnified. The… Read more »

Do Solid State Drives Fail More Often Than Hard Disks?

All disks eventually fail, whether they are hard disk drives (HDDs) or solid state drives (SSDs). But the two technologies fail in different ways. HDDs have spinning magnetic platters on which data is stored, and actuator arms that move read/write heads back and forth above tracks on the platters in order to access data block locations.… Read more »

Solid State Disks Gain Capacity Advantage Over Hard Disks

Until recently one of the factors that hindered the penetration of flash memory-based Solid State Drives (SSDs) into the corporate datacenter was their capacity deficit with respect to Hard Disk Drives (HDDs). Only months ago, at a time when 4TB hard drives were well established as commodity products, 1TB seemed to be the top of the range… Read more »

Data Security: How Companies Lose Data

As much as companies institute data security policies, they still on occasion, find themselves scrambling to recreate their lost data and repairing their reputation over a data loss or breach.  Here are 3 ways in which companies still lose data and what to do to avoid these common pitfalls. Some employees decide to use their advanced settings… Read more »

Increasing Database Efficiency in 2017

Building a database is one task. Its maintenance is another. With advancements being made in the areas of continuous integration, informatics and data visualization technologies, it is important to remember that data integrity and quality are the underlying factors that improve operational efficiency. Here’s a look back at why we started using databases and how we… Read more »

Tech Trends to Expect in 2017

Mobile Devices

As 2016 draws to a close, technological development is advancing at a rapid pace. Businesses must keep up to date with the latest tech trends which could transform several markets in 2017. Here are five of the most life-changing we can expect to see over the next year. 1. Big Data Getting Bigger Although Big… Read more »

Linux and “Defense in Depth”

Many people who have merely heard of Linux, as well as experienced Linux users, make the assumption that running Linux in itself is all of the protection against spyware, malware, and cyber attacks that they need. Linux is more secure than Microsoft Windows for a couple of reasons (although Microsoft has made great strides in security… Read more »