Whitepapers

Global Data Vault's Published Whitepapers

 

Data Protection and DRaaS Whitepapers from Global Data Vault

The following DRaaS White Papers are presented to provide further insight into planning, preparation and execution of your organization’s disaster recovery plan. While our focus is Information Technology, we’ve listed several good Business Continuity planning resources at the bottom of the page.

DRaaS in the Public Cloud Public Cloud and DR – What You Should Know

 

 

 

 

Katrina Disaster

Hurricane Katrina – How One New Orleans Company Never Missed a Beat

 

 

 

 

Developing an Effective Data Retention Policy

 

 

 

 

AccuTech – mJobTime Sails Through Hurricane Rita

 

 

 

 

 

getting inspired, followed by planning and progress on repeat until success

A Practical Guide to Business Continuity Planning

 

 

 

 

The History of Data Protection

 

 

 

 

Additional Business Continuity Planning Resources

FINRA

Disaster Recovery Institute

Sample business continuity plan template from TechTarget

We are always interested in good content on this subject. Please share your thoughts, ideas, articles, posts and whitepapers in our blog or via email to sales@globaldatavault.com.

The Case for Office 365 Backup

In the wake of Microsoft's September 4 - September 5 South Central U. S. outage for Office 365 and Azure, it's worth asking, should you be concerned with backup of your Office 365 data? It's your data, and while Microsoft normally does a good job with protecting it,...

Counting down the worst cyber security breaches of 2018 – #4

Fitness apparel manufacturer Under Armour gave us a good example of how companies can try to protect their user’s data but often fail to fully cover everything that needs protecting. The information that was stolen from Under Armour is minor compared to some of the...

Global Data Vault’s Mid-Year Count-Down of the Worst Cybersecurity Breaches

Number 5: VPNFilter More and more, our business environments are connected to the cloud. The transmission of data and the speed to which it can be accessed is critical to business intelligence and competitive advantage. When that data becomes attractive to hackers,...