I thought the advertisement in the SecureMYi Security Newsletter was pretty clever. I must admit this was the first time reading this newsletter and I found it quite informative. Anyway....here is the clever picture:
UCG Technologies specializes in IBM Power Systems (IBM i) and protects all platforms from 10GB to in excess of 100TB. Products and services include UCG Enterprise Cloud Backup, Disaster Recovery, and High Availability; Enterprise Security Training; IBM POWER8 Systems; and Enterprise Management Software (EMS). An IBM Business Partner since 1987, UCG is one of the largest independent IBM i business partners and has been rated in the top 1% of IBM business partners globally.
Wednesday, November 09, 2011
Wednesday, October 05, 2011
Disaster in U.S: An Extreme and Exhausting Year
I read this article in Yahoo news about 2011. Triple digit temperatures, Tornadoes, Wild Fires and FLOODS have pummeled the U.S. It seems like more than ever the need for appropriate backup and disaster recovery is critical. Read Yahoo article.
Wednesday, August 31, 2011
VAULT400 Competitor was "Fired"
Competitor was "Fired". VAULT400 initially lost the business due to lower install and support costs. Unfortunately, the client did not experience the savings nor support they had expected. They suffered from a serious lack of service! As you will read in this article from IT Jungle by Dan Burger; Managed Service Providers (MSPs) need to deliver project management skills. There needs to be continual communications on project status and especially on potential problems. A vendor who calls itself a managed service provider better be big on service.
Friday, July 01, 2011
77% of Businesses Experienced Data Loss Last Year
Check Point and Ponemon published the results of their survey. Security Complexity in 21st Century IT Environments, show respondents cited customer information (52%) as the most common type of information compromised – in addition to intellectual property (33%), employee information (31%) and corporate plans (16%). With the adoption of Web 2.0 applications and more mobile devices connecting to the network, organizations are challenged with enforcing better data security and IT Governance, Risk and Compliance (GRC) requirements.
According to the survey of over 2,400 IT security administrators, the primary cause for data loss resulted from lost or stolen equipment, followed by network attacks, insecure mobile devices, Web 2.0 and file-sharing applications and accidentally sending emails to the wrong recipient. In addition, approximately 49 percent of all respondents believe their employees have little or no awareness about data security, compliance and policies – encouraging business to integrate more user awareness into their data protection strategies, as people are often the first line of defense. Link to complete artcle
According to the survey of over 2,400 IT security administrators, the primary cause for data loss resulted from lost or stolen equipment, followed by network attacks, insecure mobile devices, Web 2.0 and file-sharing applications and accidentally sending emails to the wrong recipient. In addition, approximately 49 percent of all respondents believe their employees have little or no awareness about data security, compliance and policies – encouraging business to integrate more user awareness into their data protection strategies, as people are often the first line of defense. Link to complete artcle
Related articles
- Business must report data breaches to public, EU says (zdnet.co.uk)
- Largest data breaches of all time (flowingdata.com)
Subscribe to:
Posts (Atom)