dcsimg

What is Quorum Vote Weight in a Windows Server Failover Cluster?

Genuine high-availability covers outages and long-term failures. Learn how dynamic quorum automatically sets the nodes needed to keep workloads running Read the post here: What is Quorum Vote Weight in a Windows Server Failover Cluster? … [Read more...]

Ransomware continues assault against cities and businesses

Ransomware continues to make waves in the US, forcing multiple cities and organizations into tough choices. Pressed for cash and time, local government organizations are left with few options: Either pay the ransom as soon as possible and encourage criminals to continue bringing essential services to their knees, or refuse and be left with a massive cleanup bill. When a $50,000 ransom becomes … [Read more...]

Ransomware isn’t just a big city problem

This month, one ransomware story has been making a lot of waves: the attack on Baltimore city networks. This attack has been receiving more press than normal, which could be due to the actions taken (or not taken) by the city government, as well as rumors about the ransomware infection mechanism. Regardless, the Baltimore story inspired us to investigate other cities in the United States, … [Read more...]

Announcing Altaro Office 365 Backup – Available Now

Think your Office 365 data is backed up by Microsoft? It's not. Altaro Office 365 Backup is a fast, easy & reliable solution to this common misconception Read the post here: Announcing Altaro Office 365 Backup – Available Now … [Read more...]

Filesystems vs. Databases

Originally written January 2009, updated February 2019 It’s interesting to see how databases have come a long way and have clearly out-shadowed file-systems for storing structured or unstructured information.Technically, both of them support the basic features necessary for data access. For example, both of them: Ensure data is managed to ensure its integrity and quality Allow shared access … [Read more...]

Understanding RPO and RTO

Originally published March, 2008, updated January 2019 Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are two of the most important parameters of a disaster recovery or data protection plan. These are objectives which can guide enterprises to choose an optimal data backup plan.The RPO/RTO, along with a business impact analysis, provides the basis for identifying and analyzing … [Read more...]

Compromising vital infrastructure: the power grid

Where were you when the lights went out? That line became famous after the 1977 blackout in New York City. This power outage was caused by lightning and lasted for up to two days, depending on which part of New York you lived in. While in this case the power grid failure was a freak incident due to faulty backup equipment, it is still famous for the havoc it wreaked throughout the city—including … [Read more...]

Consent is not enough (part 2): GDPR recordkeeping, reporting and notification requirements

Last month, in my article titled Think you’re GDPR compliant? Think again, I wrote about how consent can be key to proving that your organization’s collection, storage, and processing of personal data of individuals is lawful under the GDPR.  Then earlier this month, in part one of the “Consent is not enough” series, I discussed […] … [Read more...]

Consent is not enough: GDPR data security requirements pt. 1

The EU’s General Data Protection Regulation has been in full force for almost three months as of this writing, but many companies are still struggling with the challenges of attaining and maintaining compliance with its numerous complex requirements. Last month, in my article titled Think you’re GDPR compliant? Think again, I wrote about how consent […] … [Read more...]

Tips for safe summer travels: your cybersecurity checklist

Summer is just around the corner in the Northern Hemisphere, and with it comes vacation plans for many. Those looking to take some time away from work and home are likely making plans to secure their home, have their pets taken care of, and tie up loose ends at work. But how about securing your devices and your data while you’re away? Here are some things to take into consideration if you … [Read more...]