Blog

Disaster recovery myths you can dismiss

Disaster recovery myths you can dismiss

Technology changes so rapidly. With disaster recovery (DR), we see business owners clinging to ideas that no longer apply. What kind of DR myths are still widely accepted by the masses? Here are three that need to be retired immediately.  Tape backups are the best DR solution Backup tapes are physical objects that deteriorate over […]

Finding Your Dream Data Center

Finding Your Dream Data Center

Author: David McCall, QTS

Source: DataCenterDynamics

Have you ever told someone that you’re in the process of moving your family into a new home? Chances are, you received a rapid mix of responses ranging from sympathy (“all the boxes…”) to envy (“you found the perfect spot!”) to curiosity (“how much did you pay?”)

In the data center industry, these kinds of conversations take place frequently and, just like with your new family home, there’s dozens of elements that contribute to the wheres, whys and hows of a Big Move.

4 facts about HIPAA and your IT

4 facts about HIPAA and your IT

HIPAA’s rules pertaining to IT are problematic to say the least, but things have become much clearer over the course of the past year. However, there are still a few areas in which your office might not be compliant. This isn’t necessarily through negligence on your part, but rather a lack of understanding as to […]

Don’t let hackers fool you with these tricks

Don’t let hackers fool you with these tricks

The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren’t immune to the hackers’ favorite strategy — social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here’s what you should know to protect your business. Phishing This is the most frequently […]

Which web browser is perfect for you?

Which web browser is perfect for you?

The battle of the web browsers has raged on for years. While the classic rivalry between Netscape Navigator and Microsoft Internet Explorer has long passed, we are now facing a broader field of competition. There are currently four web browsers competing for space in your hard drive, and we’ve drawn up this list of their […]

eni Completes Second Annual SOC 2 Examination

eni Completes Second Annual SOC 2 Examination

eni, a service provider of integrated benefit engagement solutions, has demonstrated its commitment to data security and privacy by completing a second annual rigorous outside audit of its Service Organization Controls 2 (SOC 2) Type 1 standards.

The meticulous examinations that led to the achievement were administered by the IT assurance and compliance staff at 360 Advanced, a nationally respected Qualified Security Assessor, HITRUST CSF Assessor and CPA firm based in St. Petersburg, Florida.

Fidano Completes Annual SOC 1 Type 2 Examination; Achievement Confirms Firm’s Dedication to Security Compliance

Fidano Completes Annual SOC 1 Type 2 Examination; Achievement Confirms Firm’s Dedication to Security Compliance

Fidano, a software and business solutions provider for the payment processing industry, has successfully completed a rigorous fifth annual examination of its policies and procedures under the System and Organization Controls (SOC) 1 Type 2 standards, demonstrating its ongoing commitment to data security at all levels of its operations.

5 Cybersecurity measures anyone can master

5 Cybersecurity measures anyone can master

Avoiding malware and online scams takes a lot of work. You have to treat every email with suspicion, manage a long list of convoluted passwords, and avoid public WiFi networks. Ideally, you follow several other cybersecurity best practices, but many users don’t believe they’re worth the time. If you’re one of those people, here are […]