Helping clients manage their technology for over 30 years.

Essentials to business disaster preparedness — #2: Use data loss prevention technology

Data Loss Prevention Solutions

If you don’t know much about your data, backing it up can be a challenge. Important data can be missed if it’s been squirreled away in some obscure location. And corrupted and/or hacked data can be taken as legitimate, backed up, and given an opportunity to re-infect other data and apps.

Fortunately, it’s a challenge that can be met with data loss prevention solutions that…

Continue reading

And now for the how of developing web and mobile apps

mobile application development icons

As I pointed out in my last entry, the ability to field web and mobile applications is quickly becoming a business necessity for even small enterprises.

If you’re lacking the substantial developer expertise needed to accomplish that — and most smaller and midsize organizations are — than your best option is to search out an accomplished web/mobile app development services provider.

Continue reading

Are the applications you use endangering your business? A look at the problem

application security

With all the security your IT operations (should) have, you’d think this question would be moot — but it isn’t. The applications your business and your employees rely on could be time-bombs poised to destroy your ability to function.

That’s because the vast majority of applications used in business today are connected to the Internet, often in a variety of ways.

Continue reading

What Cloud Computing can deliver — Part 2, on better security and compliance

How Cloud Computing Delivers Improved Security and Compliance

The centralization of apps, data, and management that’s an essential part of well-conceived and well-managed Cloud environments also helps make them more secure. Why? Because security policy is easier to enforce, threats to apps and data are easier to detect and address.

Since Cloud data and apps are centralized in a data center, it’s actually easier (as compared to traditional siloed IT infrastructures) to establish effective security policy, monitor compliance, and intervene quickly and often preventatively when there are issues

Continue reading

When threats come from the inside

Eliminate the Risk of Internal Data Theft using DLP (Data Loss Prevention)

Don’t underestimate the threat to your business posed by insider data theft. The risk is real and you are not being paranoid if you worry about it.

Consider, for instance, these disturbing factoids from a Symantec-sponsored 2011 study ominously entitled Behavioral Risk Indicators of Malicious Insider Theft of Intellectual Property: Misreading the Writing on the Wall, which closely examined 50 insider thefts:

Continue reading

Beware of FUD

Combine Fear, Uncertainty, and Doubt — and you get FUD, which has been on my mind lately because it so often involves attempts to thwart adoption of newly-emerging, better solutions. Consider these two tales of FUD:

The first tale, from the late 1880s, is often referred to as the War of Currents. It’s about a powerful group of direct current (DC) supporters who fought fiercely against the new, more cost-effective alternating current (AC) with a range of FUD stunts, from electrocuting animals to building the first electric chair. DC’s supporters eventually lost — because FUD can slow, but not stop, real progress.

Continue reading

Corporate data loss: How bad is it? (Part 2 of 2)

Impact of Data Loss on Business Organizations

We have spent over 12 years building our reputation and trust; it is painful to see us take so many steps back due to a single incident.
—Tony Hsieh, CEO, Zappos, after the company suffered a data breach in which 24 million customer records were stolen

Continue reading