Posts

Sophisticated Ransomware Attacks Demand Comprehensive Disaster Recovery Planning

In today’s volatile cybersecurity climate, businesses seem to be fighting a losing battle when it comes to defending against cyberattack. Organizations of all sizes are vulnerable to threats, incidents, and social engineering techniques—and when they don’t have the right defense systems in place, those threats and incidents often become a full-blown catastrophic data breach.

Read more

Do You Have The Skills To Be Secure In The Cloud?

Cloud security isn’t hard or new. It’s really just traditional concepts and concerns applied to an ‘unseen’ and multi-tenant environment. For example: IT pros familiar with applying patches to a windows server in a back closet, are now, in the cloud model, applying those same patches via RDP.

Read more

Security in the Cloud

As with any outsourced service, such as the Cloud, security is paramount. The security objectives of an organization are a key factor for decisions about outsourcing information technology services and, in particular, for decisions about transitioning organizational data, applications, and other resources to a Cloud computing environment.

Read more

Cloud Computing: Legals & Compliance

The legal environment for Cloud computing is in catch-up mode relative to the pace of Cloud adoption. Many data privacy laws pre-date Cloud computing capability. Cloud computing now possess new legal dimensions and dynamics that have not yet been fully tested, although moving quickly to adopt consensus on standards, responsibilities, liabilities and universality.

It is new territory for legal considerations for both Cloud provider and client. One thing that remains constant that impacts on legal considerations is the threat landscape constantly changes and evolves and both parties require to work together to build the jurisprudence.

Read more