Tag Archives: IT Security

Does Complacency Have a Place in Disaster Recovery Planning?

How many IT disasters can you reasonably prepare for? The big “total wipe-out” disasters like the data centre hit by a plane (for those enterprises close to airports), systems rooms flooded out (move it to a higher floor beforehand), or … Continue reading

Posted in Disaster Recovery | Tagged , , | Comments Off on Does Complacency Have a Place in Disaster Recovery Planning?

Does Complacency Have a Place in Disaster Recovery Planning?

How many IT disasters can you reasonably prepare for? The big “total wipe-out” disasters like the data centre hit by a plane (for those enterprises close to airports), systems rooms flooded out (move it to a higher floor beforehand), or … Continue reading

Posted in Disaster Recovery | Tagged , , , | Comments Off on Does Complacency Have a Place in Disaster Recovery Planning?

Disaster Recovery Designed In from (Before) the Start

Once upon a time, the software code was the only thing that mattered. Everything else was added as an afterthought, including testing (of any description), integration, security, and considerations like IT disaster recovery. Now, enlightenment is slowly spreading through the … Continue reading

Posted in Disaster Recovery | Tagged , , , | Comments Off on Disaster Recovery Designed In from (Before) the Start

3 Human Factors that Make Technical Support an IT Security Risk

Cyber criminals latched onto technical support a long time ago, seeing many possibilities for scams and attacks. Most recently, tech support scams to cold-sell support packages over the phone have been popular – according to the 2016 Internet Security Threat … Continue reading

Posted in Disaster Recovery | Tagged , , , | Comments Off on 3 Human Factors that Make Technical Support an IT Security Risk

Your Business Continuity as Your Customers See It

It’s not always easy to look at things from somebody else’s point of view. Sales and marketing people have to do so if they want to build products that customers want and get the customer’s order. Successful supply chains rely … Continue reading

Posted in Business Continuity | Tagged , | Comments Off on Your Business Continuity as Your Customers See It

And the Winner for Overall IT Security is… Linux?

Windows and Mac OS, watch out. A UK government agency tested different IT platforms to see which would be the most secure, and found that Linux (Ubuntu 12.04 in particular) was significantly better than Windows 8 and Mac OS X. … Continue reading

Posted in Uncategorized | Tagged , , , , , | Comments Off on And the Winner for Overall IT Security is… Linux?