The European Commission has confirmed a replacement for Safe Harbor, the law that protected data transfers between the United States and the European Union, and expects it to be enforced within three months, according to computerweekly.com. On Feb. 2, the European Union announced details of the EU-US Privacy Shield deal, which will replace the now-invalid Safe Harbor law. The new Privacy Shield law is expected to keep the seven principles of Safe Harbor intact, and will provide enhancement to two specific …

We’ve talked about continuous data protection, developing a DR plan, and offsite backup. What do these things all have in common? They are all a part of Disaster Recovery as a Service. Disaster Recovery as a Service (DRaaS) in its entirety offers the full suite of components of disaster recovery by a third-party vendor. It consists of a replication product (continuous data protection), an offsite backup product (point-in-time recovery), a disaster recovery plan and vaulting that plan so you can access …

What is social engineering? It’s the art of manipulation that relies heavily on human interaction and psychology to trick people into revealing sensitive information about themselves or others. Social engineering works to exploit the human inclination to trust others, and for that reason, it’s one of the most dangerous and murky threats facing organizations today. Think about it—why waste time trying to crack a password that could take hours or days, when you could get someone at the company to …

As a business, what do you need to succeed? A quality product is a must — as is a solid business model. Great people to sell and support your product are key, too. But you also need something else: A culture of transparency that builds and maintains client trust. We’ve discussed why you should do your due diligence when it comes to IT security by valuing your data, relating your security expenses as a percentage of revenue and comparing that to industry standards, and by being …

Disaster recovery plans keep your business running A disaster recovery plan is important for many reasons, but in the world of business continuity, disaster recovery planning is a must-have component. There are several steps that need to be taken within a disaster recovery plan, including determining which systems are critical, what kind of recovery site is most beneficial for your business and determining what RPO/RTO your business can afford. But one of the most overlooked components of disaster recovery is testing …

Encryption has been widely talked about as one of the best tools to protect you against potential attacks on your data. For many companies processing credit card payments, encrypting data is required for compliance with standards such as PCI DSS and individual state laws. But if you’re in the healthcare industry, it’s even more important because it’s not required for hipaa compliance. What is encryption? It takes your data and codes it using a series of mathematical formulas to render …

What is continuous data protection?

Posted on February 2, 2016 by

In today’s faster-than-ever-paced world, it’s becoming more and more important for businesses to have all the technology they need at their fingertips in order to survive. In the event of a disaster especially, if organizations want to offset their losses, they need to be able to access and recover their data and infrastructure as quickly as possible. Continuous data protection can help with this. True continuous data protection (CDP) is real time replication of data as it is being written …

We all know the importance of disaster recovery as it relates to business continuity and HIPAA compliance. However, there is a lot more to disaster recovery, and not all recovery options are created equal. Different kinds of disaster recovery are dependent on the needs of your business. In this post, we’ll talk about how the speed at which you need to recover your data and infrastructure affects your recovery site options and cost. When it comes to the speed of recovering …

There are many aspects of complying with HIPAA regulations, and all are equally important to avoid facing the stiff penalties that come as a result of any violations. In addition to technical and physical safeguards for your PHI, the administrative safeguards of the HIPAA Security Rule require a contingency plan. This is comprised of a data backup plan, disaster recovery plan, emergency mode operation plan, testing and revision procedures as well as application and data criticality analysis. We’ll discuss how …

As we’ve discussed previously, there are many parts to a Business Continuity Plan, but what makes IT disaster recovery such an important subset? For starters, many businesses are relying more and more on IT infrastructure as they become more digitized. They need connectivity, networks, and servers. Some of these companies are being forced to recognize the growing trend to move everything to the cloud, such as the healthcare industry, where HIPAA compliance requires everyone to have an electronic health record as …

Get started now. Exceptional service awaits.

Live Chat