Companies in the US are finally starting to pay attention to the General Data Protection Regulation (GDPR) news that’s been coming out of Europe lately, because compliance will be enforced starting May of 2018. That’s not a lot of time to get ready. What is this new regulation, why did it come about, and what does it mean exactly for companies in the U.S.? History behind GDPR What happened to make the EU stand up and say, “Hey, we need …

Cybersecurity journalist Brian Krebs noted on his website the security and simplicity of adding a vocal password to your authentication process when you call a company such as a bank or investment firm to obtain access about your account. Voice passwords are a great idea. They can be a very effective security measure if a hacker calls your bank to open a fraudulent account in your name or requests a large transfer out of your account. Most banks require only your …

What is serverless computing?

Posted on November 1, 2017 by

What is serverless computing? The idea is growing in popularity, but the term honestly sounds like an oxymoron. How does it work, and why should you consider it for your IT organization? Well, the name is a false promise–there are actually servers involved with serverless computing. They just aren’t managed by the organization. A serverless computing model means your cloud provider takes care of adding, removing, and/or adjusting your server resources based upon demand. You end up with a more …

GDPR vs EU-US Privacy Shield

Posted on October 24, 2017 by

The deadline for enforcing GDPR, or General Data Protection Regulation, is only a few months away, and businesses across the US are asking themselves what they need to do to prepare, if anything. What does the new regulation mean for the EU-US Privacy Shield agreement from last year? How does the newest agreement affect companies in the US? We’ll answer a few questions about GDPR and EU US Privacy Shield. What is GDPR? It’s a new framework for data protection …

A security researcher named Mathy Vanhoef of KU Leuven in Belgium has disclosed a vulnerability in the current WPA2 network. All routers that use a WPA2 (which is almost every single WiFi enabled device today) is vulnerable to a Key Reinstallation Attack (KRACK). Information that was once assumed to be safely encrypted, such as messages, passwords, photos, or credit card numbers, can now be read, and in some cases, manipulated. The problem is unfortunately not with a specific product, but rather …

According to a report published by Transparency Market Research, the market for Data Protection as a Service (DPaaS) is expected to reach $46 billion by 2024. What is DPaaS, and how does it compare to the well-established backup and DR markets? Are they the same? Let’s start with a broader picture. There are three basic levels of data protection: Offsite backup, disaster recovery, and data protection as a service. Offsite backup traditionally means taking drives and storing them somewhere else, such as your …

The internet is moving from an exchange of information to an exchange of value. E-commerce, online banking, healthcare, and human resources are just some of the industries that offer services in exchange for value. And it’s not just monetary value, either. Data has become extremely valuable as well. To conduct these value-based transactions, people use cryptocurrencies such as Bitcoin, and their underlying technology: blockchains. In this post, we’ll explain what a blockchain is, how it works, and its potential uses. …

Setting budgets has become a key weapon in the ongoing struggle of organizations to understand and control their cloud spend. Public cloud providers have responded by offering their users services such as budget alerts and server tagging. Users, however, still struggle to see the costs associated with the resources they’ve tagged. In this post, we’ll talk about the challenge of viewing your costs in Azure and how you can solve it. Azure offers a few different methods of grouping services: …

As the public cloud continues to explode in popularity, the problem of cloud sprawl, or cloud waste, also rises. Sprawl is nothing new, so why has it become a top concern for organizations? We’ll go through a brief history of sprawl, explain why it matters today, and discuss the correlation between cloud sprawl and shadow IT. Then we’ll give examples of sprawl you might find in your environment, and tell you how you can eliminate it to make your systems …

The credit bureau agency Equifax publicly reported a data breach affecting about 143 million Americans on September 7, although the company was attacked months before then. According to Equifax, the breach was caused by a vulnerability in a website application, but no further details were provided. What does this mean for the security of your personal data? The Equifax hack has some serious consequences, because the credit bureau keeps a trove of personal digital information for millions of people. Information …

Get started now. Exceptional service awaits.

Live Chat