Disaster Recovery

Strategies to prevent DDoS attacks

Strategies to prevent DDoS attacks

If you think you’re seeing more news about computer hackers, you’re right. It seems this underground community continues to wreck havoc in our online lives and businesses through increasingly sophisticated means of mischief. While the most publicized hacking events highlight stolen data, that’s not always the motivating factor. Some hackers have mastered the art of DDoS attacks, or … Continued

Cloud Disaster Recovery – Why the hype?

Cloud Disaster Recovery – Why the hype?

  There’s a lot of buzz around cloud services. Everything from accounting to telecommunications to everyday computing with virtual desktops, it’s all moving to the cloud. It’s not the wave of the future – it’s what’s happening now. Companies are embracing the cloud in droves, seeing the advantages over traditional, read “antiquated,” means of competing on the big stage. Our little … Continued

What went wrong in the days before Super Storm Sandy?

What went wrong in the days before Super Storm Sandy?

“Not only were many firms unsure about whether their galoshes were waterproof,” Bart Chilton, the regulator at the Commodity Futures Trading Commission said, “they hadn’t even tried them on.” Chilton’s sharp-tongued critique is in response to the apparent lack of disaster preparation in the days prior to the Super Storm Sandy. Chilton is still hot … Continued

Data Center Exposure and Recovery in New York City

Data Center Exposure and Recovery in New York City

Hurricane Sandy provided a fascinating opportunity to study the both the level of disaster planning and the resilience of New York City data centers. This article will examine a) what actually happened, b) what was the risk, and c) what are the lessons learned. What Actually Happened? Simply put, data centers in New York were … Continued

How to Plan and Execute a Data Protection Audit – part 3

How to Plan and Execute a Data Protection Audit – part 3

In the previous installment of our three part series on “How to plan and execute a data protection audit,” we’ve detailed the questions and reasons you need to ask regarding your data requirements, to determine what’s appropriate to include in your data protection audit. Those questions were focused on looking at the functional areas of … Continued

Data Protection Audit Planning

Data Protection Audit Planning

In part one of our series, “How to plan and execute a data protection audit,” we discussed the importance of user participation in the design process of your data audit plan. In this installment, we go into more detail about the questions you need to ask about your business processes to determine what you need to secure. … Continued