Pre-COVID data scaling, performance, and data services were largely manageable within the corporate data center. But the last several years have seen enterprises decentralize their data and IT systems, while employees now work remotely across different locations and geographies. This massive increase in remote work arrangements has created additional challenges around managing data access and […]
3 Vital Concerns for Companies Running Hybrid-Cloud Environments
The benefits of the cloud – reduced capital expenditures, greater IT flexibility, business efficiency, competitive advantage – are compelling. So much so that, not so long ago, people were predicting organizations would move their entire computing infrastructure to the cloud, and nothing would be left on-premises. It, of course, never happened. Instead, organizations have embraced […]
The Blame Game Undermines the Benefits of Cloud Adoption
It’s human nature to want to point the finger at someone else when something goes wrong, but even if responsibility rightfully lies elsewhere, that’s an ineffective way to solve a problem. Sure, root cause analysis requires identifying the source of an issue, but all too often, we stop short at the person or group exhibiting […]
The F-Word That Really Matters
We now exist in a post-privacy world. Our expectations for proper curation and care of personal data have gone out the window during the global pandemic where Big Tech, Big Pharma, and Big Government have repeatedly acted more like Big Brother without significant objection from the public. Internet trolls, deceptive sales practices, and data breaches […]
Data Privacy Has Become a Human Right
A deep history of pivotal moments gave root to our modern idea of human rights. Ancients like King Hammurabi set in stone (literally) some parts of the idea that every person has basic rights and freedom. Along the way, the Magna Carta, English Bill of Rights, Virginia Declaration of Rights, and U.S. Bill of Rights […]
3 Ways Strong Data Governance Practices Can Improve Your Business
Businesses have long struggled to find the balance between compliance and agility. This is especially true when it comes to Data Governance. According to TechTarget, Data Governance is the process of managing the availability, usability, integrity, and security of the data in enterprise systems, based on internal data standards and policies. Effective Data Governance ensures that […]
Why Tape Backup Is Experiencing a Renaissance in the Digital Era
There’s no shortage of stories reporting the (supposedly) imminent death of tape storage. The stories always cite the drawbacks of the technology, which, granted, are not insignificant. For many small and medium businesses, tapes can be labor-intensive, requiring a manual process to change them at the beginning or end of every day. Tapes can also be misplaced […]
5 Ransomware Predictions for 2022
In 2021 ransomware was truly brought into the average family’s home. Their weekend BBQ and gas station fill-ups were affected by ransomware. Their nightly news brought talks of Russian hackers and numerous FBI alerts warning of advancing cyberattacks. Well, get ready, because a new year on the calendar is not going to end the disruptions to […]
The 2021 Year in Review and What to Expect in Data Security in 2022
This year saw a number of significant changes on both the state and federal levels with regard to data privacy and data security. These changes reflect the increasing focus on the digital landscape to which the global economy has shifted and emphasized a much sharper focus on protecting sensitive information. Indeed, the significance of having strong cybersecurity […]
Is Air-Gapped Backup Necessary for Effective Data Protection?
Air-gapped backup is becoming increasingly popular in the backup and disaster recovery (DR) industry. Most backup and DR vendors are already offering it as an integrated feature or in the process of including it in their solution(s). The biggest driver for air-gapping is the increasing number of cyber threats such as ransomware. Ransomware attacks have […]