How To Select The Right Location For Your Disaster Recovery Data Center

data center

Remember the business aftermath of Hurricanes Katrina and Sandy? In each case, companies far and wide scrambled to put business continuity/disaster recovery (BC/DR) plans in place if they didn’t already have them – whether or not they had felt so much as a raindrop from the super-storms. But human memory is short-lived. As incredible as it may seem, some people have already forgotten the devastation and destruction caused by disasters such as Hurricanes Sandy and Katrina. The problem, of course, is that the risk of disasters hasn’t gone down, even if our alertness to them has. All you need to do is take a look at data such as Sperling’s natural disaster map to see that the next disaster cou … Read more

The Simple Way To Explain Business Continuity And Disaster Recovery To A 7-Year-Old

disaster recovery

I was chatting with my boss the other day, and he said, “My daughter asked me last night, ‘What do you do, Daddy?’ You know, it stumped me for a minute. After all, if you’re an architect or a librarian or a teacher or a writer, it’s easy to explain it to a kid. But how do you explain that you work for a BC/DR firm specializing in organizational resiliency? Children don’t know what business continuity or disaster recovery are, or why a company would need either one.” Having a few peers and relatives who do not understand what BC/DR is, I was curious. “What did you tell her?” I asked. “I gave her a very simple analogy,” he replied. “I told her I’m like a doctor. But instead of treating pe … Read more

The Best IT Blogs Of The Week: 11-19-14

IT blogs

How do you feel about privacy? It’s a simple question, but tough to answer in this day and age where the digital world has complicated how our information is used and shared. The Pew Research Center has found that Americans distrust just about any and every communications channel with sharing their information, from email to landlines. “Yet Americans for now seem to grudgingly accept that these are the trade-offs of living in the digital age — or else they fear that it is too late to do anything about it,” writes Claire Cain Miller from the New York Times. Check out the article detailing more on the privacy paradox titled “Americans Say They Want Privacy, but Act as if They Don’t.” Are you on … Read more

The 10 Hardest Things To Change In Information Technology (IT) Are People-Driven

information technology

Information technology (IT) would be easy – if our co-workers didn’t get in the way. And that doesn’t just mean non-tekkie end users who don’t know any better … it also includes my fellow IT folk who darn well ought to know better. (As a 34-year veteran of IT, I think I’ve earned the right to make this statement.) For those of you who are also in IT, here’s a list of the 10 hardest things to change that I’ve come across. Let’s share in a chuckle and shake our heads at how technology changes all the time … but people never do. 1. BYOD or bust! People like their smartphones, tablets, and gadgets. If they’re not in management, they’re going to sneak them in and use them, just like bad child … Read more

Did You Know That The NFL Uses IT, Too?

NFL

As an avid fan of the National Football League (NFL), I have spent countless hours consuming their product but rarely, if ever, did I stop to think about the business of football, specifically on the information technology front. This recently published piece by NetApp on Forbes does an excellent job of outlining the incredible expectations and pressures on Russ Trainor, the Denver Broncos’ VP of IT. Russ’ team depends heavily on his network, including partners and vendors, to deliver on those expectations to ensure that one of the league’s flagship franchises runs like a well-oiled machine. As the Denver Broncos’ VP of IT, I’m in an interesting position. I can compare a “traditional” IT … Read more

How To Conduct An Information Security Gap Analysis

information security gap analysis

As an information security consultant, one of the most important jobs I do is to conduct an information security gap analysis. This analysis provides a comparison of your security program versus overall best security practices. By comparing these best practices to actual practices, we can shed light on areas where vulnerabilities and risks are lurking. However, it’s not only important that a gap analysis be conducted; it’s also important that it be done correctly. Here are 4 steps that are critical for every information security gap analysis. Step 1: Select an industry standard security framework One of the most common frameworks is the ISO/EIC – 27002 standard. ISO/IEC 27002:2013 provi … Read more

Explore The Key Reasons Why 85% Of Configuration Management Database (CMDB) Implementations Fail

CMBD

Having a configuration management database (CMDB) can be a huge asset. After all, it provides a holistic view of your IT environment, captures the true impact of the thousands of changes you make every year and equips you with a roadmap for disaster recovery. The many organizations each year who attempt to build a CMDB have the best of intentions—but the overwhelming majority, an estimated 85 percent, fail in their efforts. Why would a business want a CMDB in the first place, and why do they fail? Let’s have a look. Why CMDBs? First, why do companies attempt to create CMDBs? A CMDB is intended to capture a holistic picture of your IT environment, including all systems, networks and per … Read more

Let’s Take A Deep-Dive Into The Shellshock or Bash Vulnerability

bash vulnerability

Since it was discovered, the Shellshock or Bash vulnerability has created quite a stir. Depending on which security expert you talk to, Shellshock is either going to be a bigger threat than Heartbleed, or it’s a lot of fuss over nothing. We only learned of the vulnerability at the end of September, so it is hard to judge just yet how well the patches will work or how cybercriminals will exploit the vulnerability. Bash stands for Bourne-Again SHell and is the primary command line used in certain versions of Linux, OSX, and other open source-based operating systems. Because it is used in open source software, Bash (the interface) is freely available to anyone who wants to use it. Although t … Read more

The Best IT Blogs Of The Week: 11-12-14

IT blogs

When it comes to college, there’s a lot of uncertainty. “Will my child make friends? Will they like their school and their studies?” These are some of the questions we ask ourselves. But one we don’t often think about is this: “Will someone steal my son or daughter’s information?” It’s more common than you think. Don’t let a breach on college campuses take advantage of your child’s information – make sure you and your child are aware of the issues at hand. For that reason, Sue Poremba is detailing five cyber threats that YOU should know before your child goes off to college. These include awareness of malware, password problems, and BYOD, among others. And while we’re on the topic of warni … Read more