Yes, of course you need to back up your critical data files, and yes, the cloud has made that task easier. But the cloud and virtualization have also added a whole new aspect to backup and many people are forgetting about it.
5 years, 4 monthsWe review products independently, but we may earn affiliate commissions from buying links on this page. Terms of use.
IT Watch
Latest IT Watch
-
Backing Up May Be Easier, But There's More to It Than You Think
-
Here's Why Diversity Is an IT Issue
IT and the technology sector in general continue to have a diversity issue. It's not just a hiring problem, but also a legal and business risk. Here we discuss not only why this issue exists, but how to help turn the tide.
5 years, 6 months -
Why 'World Backup Day' Isn't Enough
World Backup Day was created to encourage people and organizations to back their data up on the last day of March each year. While that's great, you're going to have to do a lot better to achieve even basic data safety. The good news is, it's not that hard to do.
5 years, 7 months -
Pick the Right VPN Service for Your Business
VPN services started life as consumer products and that's still the sweet spot. They have, however, become a core PC security technology so your business shouldn't simply ignore them. Look into whether they can help your users, and when you do, here's what to look for.
5 years, 11 months -
How to Make Sure Your Business Survives a Disaster
Disaster planning and disaster recovery done properly can mean the difference between your business surviving or disappearing when something bad happens.
6 years -
Avoiding a $40M Tweet: 7 Tips for Making a Solid Social Media Policy
Elon Musk's recent tweeting adventure cost him and Tesla $40 million. That's why your company needs a social media policy. Here's how to build one and ensure your employees follow its requirements.
6 years, 1 month -
Why Consumer VPNs Aren't Business-Grade
Virtual private network (VPN) services provide an encrypted link between your personal devices and the internet, but that doesn't mean you should rely on them for sensitive corporate data.
6 years, 1 month -
7 Steps to Minimize CEO Fraud and Identity Spoofing
Identity spoofing is one of the most insidious and successful phishing attacks currently in use. Here are seven steps to take to make cybercriminals' efforts less effective.
6 years, 1 month -
Disaster Recovery: Make Sure Your Company Survives the Unthinkable
An unthinkable tragedy years ago forever made the value case for efficient disaster recovery (DR) planning. Luckily, today's off-site backup services make the DR planning process easy for companies to protect against disasters, including storms like this week's Hurricane Florence.
6 years, 1 month -
Beyond the Perimeter: How to Address Layered Security
It's critically important to protect everything inside your network, not just the perimeter, but you need to take an intelligent approach to layered security.
6 years, 2 months -
Finding and Fixing Security On Your Network Perimeter
Networks need multiple layers of security. However, with the complexity inherent in the internal layers, many folks pay short shrift to the perimeter. That's a mistake and here's why.
6 years, 2 months -
Note to IT: Blockchain Isn't Magic
The blockchain bubble is in full bloom. But, while this revolutionary technology certainly has a pedigree of strong points, it's neither a silver bullet nor bereft of risk. Here's why.
6 years, 2 months -
How to Protect Your Business From a Hacked Fax
Networked fax machines are just one of a group of highly insecure Internet of Things (IoT) devices that exist in every company. Here's how to hacker-proof these oft-overlooked devices.
6 years, 2 months -
Measure Your Network Latency Before It Becomes a Problem
Latency can be a problem in networks, especially if there's a cloud service involved. You may not be able to eliminate it, but here's how you can mitigate it.
6 years, 3 months -
Mixed Network Hardware Needs Monitoring That Leverages Big Data
In many ways, an enterprise network is a monster with many heads, and you have to deal with each of them as necessary to perform real monitoring for the entire network. That needs more data than most tools provide.
6 years, 3 months