IT Disaster recovery is all about protecting your data, and the cost of data loss can be staggering. According to the Institute for Business and Home Safety, an estimated 25 percent of businesses do not reopen following a major disaster. As a business, you spend an enormous amount of time, planning, and money into making your organization successful. But what are you doing to protect yourself against a disaster? If it’s time for you to re-evaluate your current DR position, …

Disaster recovery is neither simple nor easy. The underpinnings of a successful disaster recovery strategy are complex and often difficult to implement and maintain. If you lead a technology department, you have a running list of disaster recovery issues that rapidly goes from manageable to overwhelming. It is a time-consuming and complicated endeavor. You know that your data systems are critical to your business. Without them, your business soon grinds to a not-so-graceful halt. The risk of losing business compounds with every …

Flash, SAS or SATA storage?

Posted on March 30, 2016 by

All-flash storage has become a big trend not only in the consumer market with phones and laptops but also in the enterprise, with companies like EMC and Pure Storage dominating the news and the market. Does this mean traditional hard disk storage is dead? Not exactly. Two big benefits of this non-volatile memory are that it does not require power to maintain stored data integrity, and it resists wear and tear better than traditional hard drives. These two combined have made it the …

Encryption is becoming more and more a part of our personal and professional lives. One could even argue that we can’t live without it. In fact, it’s become so standardized that Amazon recently announced it was bringing back encryption to its Kindle Fire tablet after removing it in a previous version and hearing customer complaints. And with all the media coverage surrounding Apple’s latest encryption fight, it’s safe to say it’s at the forefront of security-related minds. Encryption, which typically uses an …

All forms of media have been dramatically transformed by their digitization, including video, music, the classifieds, magazines and pictures. This digital transformation enabled a new business model and was an onslaught that decimated the print and analog industries as we knew them. Now data virtualization is heading for IT. Is that a bad thing? IT professionals claim they benefit from it. All of this virtualization will call for more and more of their expertise, they say. As everyone digitizes everything, the world …

What is social engineering? It’s the art of manipulation that relies heavily on human interaction and psychology to trick people into revealing sensitive information about themselves or others. Social engineering works to exploit the human inclination to trust others, and for that reason, it’s one of the most dangerous and murky threats facing organizations today. Think about it—why waste time trying to crack a password that could take hours or days, when you could get someone at the company to …

As a business, what do you need to succeed? A quality product is a must — as is a solid business model. Great people to sell and support your product are key, too. But you also need something else: A culture of transparency that builds and maintains client trust. We’ve discussed why you should do your due diligence when it comes to IT security by valuing your data, relating your security expenses as a percentage of revenue and comparing that to industry standards, and by being …

Picture this: Your business requires the medical and payment data of three million people, one-third of whom are Medicare recipients. Because of this, you have a big red bullseye painted on your infrastructure and all sorts of seedy characters want access to that information, either for themselves or to sell in the dark underbelly of the internet. “Don’t worry,” you say, “we’re protecting that data.” You have a security infrastructure in place, so you figure everything is fine. But how …

Critical reasons to value your data

Posted on January 12, 2016 by

Let’s talk about your personal belongings for a second. When you apply for homeowner’s insurance, you’re asked to value your property. How much is your computer worth?  All of those tools you have tucked away in the garage? What about your wardrobe? Kitchen supplies, furniture and so on also must be taken into account. The reason is obvious of course: If someone were to steal them, you can file a claim and get reinbursed based on the value of your possessions. …

“Our job as providers is not telling them what they need, but rather listening to the customer’s needs” – Lance Thompson In preparation for our Indianapolis and Metro Detroit business continuity and disaster recovery workshops, I spoke with Lance Thompson, founder and president of Baseline Data Services about what we can expect from his session, Real Life Disaster Recovery: Precious Vicarious Lessons. He shared some BCDR wisdom that was too good not to pass on. As highlighted in the quote …

Get started now. Exceptional service awaits.

Live Chat