The Best IT Blogs Of The Week: 10-15-14

IT blogs

Bob Dylan said it best: “The times they are a-changin." With a new company falling victim to a breach nearly every week, combined with the advent of cloud technologies, it all leads to a ripple effect throughout the IT industry. In response, organizations are switching things up internally and with their offerings as they try to keep pace with the fast-evolving market. Let’s take a look at some of those changes in this week’s roundup! Quick News: JPMorgan, Russian Cybercriminals, and Consumers After all signs point to Russian cybercriminals for the JPMorgan hack, the folks at Bloomberg Businessweek are connecting the dots. In a recently published article they speculate that the large-scale … Read more

The Surprising “Weakest Link” In Disaster Recovery Success

Are your external communications threatening otherwise sound disaster recovery plans?

Your company is prepared. You have your disaster recovery (DR) plan written and available on an externally-hosted website. Your contracts are in place; your backups are verified and off-site. Your critical data is replicated to your DR provider. You have plans for all your people if the disaster impacts them and your facility. Bring on the zombie apocalypse: you are ready! Umm … maybe you’d better hope those zombies stay in their graves a little while longer. You see, when I consult with clients, I always ask a certain question … and it usually punctures their self-congratulatory bubble. Ready? Here it is: “Have you tested your external connections under disaster recovery conditi … Read more

Managing Your Crisis Management: 5 Ways To Get Ahead Of The Mess

Are you ready?

Most crisis management plans kick in after an event has occurred. But there’s also an aspect to crisis management that can (and should) take place before any incident happens. The fact is, current mechanisms for predictive analysis, modeling, and forecasting – coupled with availability of data – allow organizations to identify and respond to events and scenarios before they occur. Proactive measures are as much a component of contemporary crisis management as is disaster recovery. Firms are often able to mitigate losses and remain productive in the face of crippling disasters – or even avoid outages altogether – by actively developing response and communication plans to address crises befor … Read more

Why Hybrid IT Environments Make A Hot Mess For Disaster Recovery [INFOGRAPHIC]

hybrid IT, infographic

Data from Sungard Availability Services shows that 65% of all IT environments are multi-platform (or hybrid). Believe it or not, this makes IT's task of recovering these environments a "hot mess." This infographic gives you 5 actionable steps to take to resolve your own "hot mess." To Share this Infographic On Your Site:Please include attribution to sungardas.com with this graphic. This infographic was first shared on Forbes.com. … Read more

When Backup Screws Up Recovery: Why And What To Do About It

Backup and recovery

Ever spend gobs of time and money and effort to achieve a business goal, only to find out that you screwed up something else in the process? Man, I hate that. The problem is, I see companies do it all the time in my job in one specific area: they are focusing on their backup goals and simultaneously trashing their recovery objectives. I’d like to tell you about it so that it doesn’t happen to you. Companies know the importance of backup. That’s a fact. I don’t think there are many, if any, companies out there who would say, “Backup? Nah – waste of time!” In fact, companies are really attuned to the importance of backup and to the problems involved in it. Namely: • Data is growing at a rat … Read more

Why Hybrid IT Makes A Hot Mess Out of IT Disaster Recovery

If recovering your hybrid IT environment gets messy, try turning to an IT expert. They can be the key to your success!

The world doesn’t run on Intel alone. At first glance, it may seem like that, but experience has shown us that things are never as simple as they seem. As an IT availability company managing and hosting services for more than 7,000 customers, we have unique insight into the realities of an IT environment. To prove our point, we recently looked at the requirements of more than 1,800 of our recovery-as-a-service customers to discover just how complex the business IT world is. The results were a “hot mess,” to say the least. While it’s true that nearly 9 out of 10 customers (87 percent) depend on the Intel x86 platform for critical business functions, only about a third of them (35 percent) run … Read more

Using Test/Dev For Disaster Recovery: Like Robbing Peter To Pay Paul

Using Test/Dev for DR? With the plethora of viable alternatives today, there is no reason to continue robbing Peter to pay Paul.

The debate about whether to use Testing and Development infrastructure (Test/Dev) for disaster recovery (DR) is like global warming: for every opinion on one side, there is an opposing opinion on the other. Where companies stand on the matter often depends on what their agenda is. For example, hardware and software vendors write most of the publicly-available white papers, so by default they can't be considered unbiased in most cases. Gartner and other analysts have written fairly good white papers on this subject, but they too, are often influenced by professional relationships and sometimes don’t consider or understand the capabilities of less known (but very reputable) service providers … Read more

The Best IT Blogs: 6-25-14 Weekly Roundup

IT blogs

Today, for almost every decision we make, from choosing a car to choosing a home, safety and security is always one of the most important considerations. The same goes for businesses navigating the cyber world. This week’s roundup proves that keeping data protected from intruders should be your company’s first priority. Here’s why: The New York Times recently published an article on how hackers are getting smarter by the minute. A new strategy, ransomware, essentially steals your data and holds it hostage until a fee is paid. But ways to fight back (without illegally entering another network) can save your business time and money. Options like using tags to monitor valuable information or im … Read more