GDPR? Old news. (We’ll just pass over the fact that many organizations have yet to reach compliance…that’s another story.) While hosting providers that advertise to European companies and individuals must comply with the EU law, there are other legal requirements that US-focused organizations have to consider, namely Data Shield and an upcoming compliance mandate in the state of California that is similar to GDPR itself.
Privacy Shield is an international law in flux, with EU lawmakers threatening to withdraw entirely if the USA does not enforce compliance. The California Consumer Privacy Act (CCPA) will go into effect in 2020.
What do these laws entail? And should your organization be concerned with these data privacy measures?
You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.
While each of these infrastructure design strategies has a role in keeping your critical applications and data up and running, they do not serve the same purpose. Simply because you operate a High Availability infrastructure does not mean you shouldn’t implement a disaster recovery site — and assuming otherwise risks disaster indeed.
What’s the difference between HA, FT, and DR anyway? Do you really need DR if you have HA set up?
The IT channel is taking ever bigger bites out of the cloud computing market. Only 39% of companies report sourcing their cloud services directly from Cloud Service Providers, leaving the remaining 61% to a mix of CSPs and third parties, with 10% coming primarily from third parties alone, according to a CompTIA survey. Meanwhile, IaaS, Security as a Service (SECaaS), and SaaS all offer higher average MMR than Contact Center as a Service, Data Networks, and Voice Network services, according to Avant.
If you’re looking to shift some of your clients and sales towards the cloud, you need to adjust your operations accordingly or risk losing customers to direct sales or competitors.
Here are the biggest changes you’ll need to make to your channel sales and IT operations in order to maximize on your cloud resale strategy.
The Green House Data team is closely monitoring Hurricane Florence as the storm approaches landfall and will continue to monitor the storms’ progress. We've taken the following steps and precautions for the storm.
Let’s get this out of the way first: two factor authentication is an effective mode of account verification and far, far better than a simple username and password (single factor) authentication method. But it isn’t a magic bullet and can be overcome, especially with clever social engineering (unsurprisingly, the weakest link in security remains people rather than technology). Ultimately, 2FA is only as secure as the method and technology or product used to secure it.
Here’s how 2FA can be overcome by determined hackers and how you can best maintain account integrity across your organization or personal accounts.