Tag: information security


author:

Security

Security Monitoring – It’s All About the Data


In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential. What happens if a threat is detected? What can we do to monitor for …


author:

Database Security

Data Protection: Culture, Tools, People, and Roles


In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture.  In this post, I’ll be going over the data protection tools, people, and roles I recommend to successful organizations. Tools Given the volume and …


author:

Database

The Hidden Costs of Backup Software


The focus of data protection has changed. Backups and data recovery used to exist primarily to protect against human error or natural disaster. The focus was on recovering from an accidental deletion or salvaging company data after a data center burned down. Today, data …


author:

Database

Culture of Data Protection: What Your Customers Expect


We’ve talked about building a culture, why it applies to all data environments, and some specific types of data protection features you should be considering.  Today, we’ll be considering the culture of protection the actual owners of the data (customers, employees, vendors, financial partners, etc.) expect from your …






author:

Security

Bringing Ease of Use and Security to Remote Users


The image of a modern office has been rapidly changing in recent years. From the medical field, to sales, to technical support, users are on the road and working from just about everywhere possible. Firewalls, malware protection, and other IT security practices are great …