Endpoint security is the weak link in many organization’s security strategy. We spend time securing the network assets, including company-owned endpoint devices and then we allow personal devices access to these same networks. It might be a manufacturing company that hosts a sales meeting for people from across the region. Or it might be a…
Disaster Recovery Business Risk Assessment – Know What Before How
In my last blog post I talked about the first step in Disaster Recovery or High Availability planning, Business Impact Analysis – The First Step in DR Planning. The next step in the process is conducting a Risk Assessment. A risk assessment will help you identify the events that could impact your organization. This will…
Is server consolidation always the most cost effective solution?
If you’ve read some of my recent blog articles, you’re probably well aware that I love configuring hardware solutions. It may even be considered by many as a borderline obsession. Even though we still consider it hardware, 90% of the process is spent dialing into the most cost efficient combination of hardware and software to…
IBM Contracts Online
The story is common. It’s a Saturday evening or a holiday, and you’re having an issue with your IBM hardware. You know you have an IBM maintenance contract for the hardware. You’re not sure what the expiration date is, or specifically what’s covered on the contract. Sure, you can call 1-800-IBM-SERV (800-426-7378) and they will…
Social Media and Business, the Business of Insight
I’ve been thinking a lot about social media and the use of the massive amounts of data that it represents. I’ve had reason to think about it lately because we’re in that business. I sometimes find the universe of what I call social data too large to comprehend. The term used in the industry is…