dcsimg

Druva Achieves AWS Government Competency

Druva today announced that it is deepening its relationship with Amazon Web Services (AWS), announcing the achievement of the AWS Government Competency. Druva adds this accomplishment to its list of other similar achievements such as AWS Storage Competency Partner, AWS Public Sector Partner Program and AWS GovCloud Skill designation. The company’s collaboration with AWS further demonstrates … [Read more...]

Policies and procedures, you need for PCI DSS compliance

Technology can only do so much to protect an organisation from data breaches. That’s why Requirement 12 of the Payment Card Industry Data Security Standard (PCI DSS) states that organisations should actively manage their data protection responsibilities by establishing, updating and communicating security policies and procedures in response to regular risk assessments. As with technology, security … [Read more...]

How Safe Are Your Backups?

It may seem like a silly question, as backups are never traditionally thought of as being at risk. It stems back to a time when backups were on tape—a medium that would be tough for even the most skilled developer to hack into. But today’s backups are stored (whether on-prem or in the cloud) on disk… or more specifically, files in a file system. Depending on how accessible that file system is, … [Read more...]

5 ways to become a successful distance learning student

Distance learning has opened doors for people who want to gain new skills but for whatever reason are unable to take traditional, classroom-based courses. However, we understand that the idea of studying by yourself can seem like a daunting, and perhaps even an isolating, experience. But there’s much less to fear than you might think. There are a lot of similarities to classroom-based learning – … [Read more...]

How to deal with subject access requests

Among the many rights the GDPR (General Data Protection Regulation) gives data subjects is the right to access their personal data, along with certain information relating to how it is processed. If your organisation processes personal data, do you understand when the right of access applies? Do you have processes in place to ensure you can facilitate this right? And do you know exactly what … [Read more...]

Parallels Is Attending the Software2 User Day

Software2 User Day Software2 User Day – We’re excited to announce that Parallels is attending the S2 User Day at Coventry University on Wednesday, June 27. We’ll meet and greet IT professionals from surrounding universities and colleges to share the integration of Parallels® Remote Application Server (RAS) and AppsAnywhere. S2 User Days allow you to learn … [Read more...]

Does GDPR compliance mean more reliance on SEO and PPC?

It’s been nearly a month since GDPR compliance became law, and although there are no headline hitting breaches yet, it has had far-reaching implications for [...] The post Does GDPR compliance mean more reliance on SEO and PPC? appeared first on Webtrends. … [Read more...]

Unlimited possibilities with GFI Software

Unleashing the power of GFI Unlimited was exciting last week as GFI Software welcomed established distribution partners from around the world to beautiful Scalaria, St. Wolfgang im Salzkammergut in Austria to take a closer look at the growing GFI Unlimited software library of network security and communications solutions. The GFI Software Distributor Forum 2018: Unlimited Possibility event was … [Read more...]

Announcing the latest update to Altaro VM Backup: Continuous Data Protection

We’ve been working hard here at Altaro to deliver a few major new features for your favorite backup and recovery application. We hope you’ll love them! Introducing Altaro VM Backup 7.6 We always take customer and community feedback very seriously when it comes to determining what comes next, and once again we’ve delivered on some of the most commonly requested features for Altaro VM Backup. … [Read more...]

10 Steps to Improved Cybersecurity—Building a Culture of Security

People are both your weakest link and your best defense in the fight against cybercrime, so it's important they understand what is appropriate in their environment. From a cybersecurity perspective, companies want their staff to question what is going on and have a cautious mindset—and that means being cautious at home as well as in the workplace. Read More … [Read more...]