We’ve had many conversations lately with clients regarding their need to organize, prioritize, or “do something’ with legacy data and sometimes legacy code. The origins of these conversations are varied from moving off a production technology platform, enterprise software migrations, industry regulations, to sometimes corporate bureaucracy demands. The conversations typically center around having large amounts…
Prioritizing Threats and staying ahead of the Cybercriminals
The methods of attack and the strategies of the people that attack our networks and data resources continue to evolve. Those of us responsible for protecting resources need to stay ahead of the threats. And as the threats change, the cybercriminals are using new tools to obscure their existence and evade detection. Ransomware is a…
What was Important in 2017
It’s December – the time of year when we start thinking about next year. Maybe you’re knee deep into planning for 2018. Maybe the boss is pressuring you for those budget numbers? If you’re like me, you ‘re spending a little time thinking about the past 11 months or so. As I look back at…
Disaster Recovery Business Risk Assessment – Know What Before How
In my last blog post I talked about the first step in Disaster Recovery or High Availability planning, Business Impact Analysis – The First Step in DR Planning. The next step in the process is conducting a Risk Assessment. A risk assessment will help you identify the events that could impact your organization. This will…
Business Impact Analysis – The First Step in DR Planning
Disaster Recovery and High Availability have been a pretty common theme in client conversations lately. Most of the conversation centers on the increased awareness of the need by business management and the continued decline in the costs involved in implementing those solutions. In a blog post I wrote a couple years ago I talked about…