Have you ever read about TV ratings? Almost every person that watches TV has heard of the ratings produced by the Nielsen Media Research group. These statistics shape how we watch TV…
In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture. In this post, I’ll be going over the data protection…
What do The Guru, The Expert, The Maven, The Trailblazer, The Leading Light, The Practice Leader, The Heavyweight, The Opinion Shaper, and The Influencer all have in common? These are…
As anyone that has run a network of any size has surely experienced, with one alert, there is typically (but not always) a deeper issue that may or may not…
If you are old enough, you might remember that commercial that played late at night and went something like this… “It’s 10 p.m., do you know where your children are?” …
The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although…
When you go on a trip somewhere, you always take a map. When I was growing up, that map came in the form of a road atlas that was bigger…
We’ve talked about building a culture, why it applies to all data environments, and some specific types of data protection features you should be considering. Today, we’ll be considering the culture of protection the…
“Hello! My Name is Phoummala and I have re-occurring imposter syndrome. I struggle with this frequently and it’s a battle that I know I am not alone in.” What is…
Data, data, data. You want all of the data, right? Of course you do. Collecting telemetry and logging data is easy. We all do it and we all use it…