Does Your Organization Need Cyberinsurance?

Written by Joe Kozlowicz on Thursday, March 2nd 2017 — Categories: Cloud Hosting, Colocation, Disaster Recovery, Security

In the past decade, alongside the increased importance of digital tools for business, a new category of insurance has sprung up to cover digital data breaches and liability. With the average total cost of data breaches reaching $4 million dollars and the average cost of each lost or stolen digital record increasing to $158, it is clear that experiencing a data breach is an expensive affair.

While dedicated security response teams and encryption do decrease these costs, and IPS/IDS systems and other security measures can help reduce the risk, many organizations will still experience a data breach at some point.

Cyberinsurance can help mitigate the cost of a data breach by reimbursing your company for legal fees, helping with the cost of crisis management and investigation, notification costs, extortion liability fees, and third party damages relating to network or system outages. But does every organization need cyberinsurance?

Continue Reading...


To Maintain IT Security, You Might Need to Annoy Your Users

Written by Joe Kozlowicz on Friday, February 17th 2017 — Categories: Security

We've posted quite a bit about best user practices to maintain the integrity of your IT infrastructure, especially strong password hygiene, the use of antivirus/antimalware, and the importance of backups in the case something goes awry. With user negligence causing up to 68% of breaches, according to a Ponemon Research study, these practices are essential. But how can you make sure your employees adhere to them?

But a recent article covering the Clinton presidential campaign staff methods to encourage information security reveals one secret to IT security: being kind of annoying.

Continue Reading...


Legal Battles Over Local Data: Why Your Cloud Location Matters

Written by Joe Kozlowicz on Wednesday, February 15th 2017 — Categories: Cloud Hosting, Cloud Storage, Security

Placing data in the cloud comes with a set of concerns — accessibility (will my information always be available if the cloud has technical problems?) and security (how safe is my data when I can’t control the security measures?) chief among them. Of these, security has long been the primary concern for technology decision makers considering the cloud.

Recent surveys reveal that while security remains top of mind, the location of data is rising in prominence as a barrier or concern for cloud adoption. These concerns stem in part from the difficulty of visibility into data transit and storage. Customers might want to know where exactly their data is residing so they can retrieve it quickly — and also for legal implications.

Two recent court cases between Google, Microsoft, and the Federal Government highlight the legal entanglements that could come with storing information in the cloud. Read on to learn why the location of your cloud data is vital.

Continue Reading...


The History of Cloud Computing: How Did We Get to Google Apps and IaaS?

Written by Joe Kozlowicz on Friday, January 20th 2017

The term “cloud” may only have reached our collective consciousness in the past few years, but the concepts involved in cloud computing date back many decades. Starting with utility computing and moving on to virtualization and grid computing, distributing compute resources has long been a way to minimize costs involved with IT infrastructure.

Let’s see how we moved from the mainframe to Salesforce with this quick history of cloud computing.

Continue Reading...


How to Choose an Availability Strategy for SQL Server on vSphere

Written by Joe Kozlowicz on Tuesday, January 17th 2017 — Categories: Cloud Hosting, Microsoft, VMware

When designing the architecture for your SQL Server virtualized on VMware vSphere, your requirements will determine which SQL availability or vSphere availability features you should use. There are several availability features packaged with SQL server before you even get to vSphere features like Distributed Resource Scheduler, High Availability, Fault Tolerance, or vMotion, each of which have their own considerations when interacting with SQL.

To get started, you’ll want to ask yourself a few questions about your SQL deployment.

Continue Reading...

Chat Now