As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

Going Beyond IT Security to Cybersecurity

Going Beyond IT Security to Cybersecurity

Does your MSP offer IT security, or does it truly provide cybersecurity services? Often seen as a difference without distinction, one cybersecurity expert argues that the approaches to security need to be looked upon as separate concepts. In a new article for Network...
Tales from the Ransomware Wars

Tales from the Ransomware Wars

Ransomware is becoming a part of everyday life. This is illustrated by startling examples of the insidious malware that have occurred in just the past few weeks. Ransomware occurs when a user executes malware that locks up his or her device. The malware gets into the...
Are You Spending Your Security Budget Wisely?

Are You Spending Your Security Budget Wisely?

Take a moment to think about your security budget. Has it increased over the past few years? If it has, has your security system done a better job at preventing or mitigating potential threats? Or does it feel like you are tossing money into a giant pit because no...
A Refocus on Disaster Recovery

A Refocus on Disaster Recovery

The script seems distressingly familiar: A disaster — a hurricane, a flood, a tornado, an earthquake — causes billions of dollars in damage. After arguments about fairness and federal responsibility, the federal government comes up with money to help the...
Employee Engagement Starts with Communication

Employee Engagement Starts with Communication

What’s The Big Deal? Employee engagement. This term has been popping up everywhere for quite a while, yet organizations are still struggling to define it, execute it, and measure it. Here are some of the stats we keep seeing: 70% of U.S. workers are not engaged...
Disaster Planning

Disaster Planning

Preparing for a disaster means starting earlier than when you see the flood water creeping up your street or see smoke in the distance. You need to have certain steps accomplished before the first raindrop even lands on your roof. With experience in restoring homes...
The social side of flexible working

The social side of flexible working

70% of U.S. business people say flexible work allows them to get out and meet with people more often DALLAS – Flexible workers have a more active social life (70%), reveals latest study commissioned by Regus, the flexible workspace provider. Workers report that...
Getting on Board with Privacy

Getting on Board with Privacy

The spate of unprecedented cases of accounting fraud at the turn of the century left heads of industry like Enron, Tyco International and WorldCom egg-faced and Congress in reckoning.  These last-straw scandals shed light on the inadequacies of the regulatory...
Data Lake Hacking is the New Dumpster Diving

Data Lake Hacking is the New Dumpster Diving

When computers ran on punched cards and information was stored and communicated using paper, suspicious individuals could sometimes be seen loitering close to the large rubbish bins or dumpsters used for corporate refuse. The idea was to fish discarded documents out...
Secrets revealed: implementing an EMNS

Secrets revealed: implementing an EMNS

Turn on CNN, pick up a newspaper, or spend anything more than two minutes on the Internet and you’ll see—there’s not a day that goes by without some kind of threat to business as usual. Severe weather events. Terrorist activity. Wildfires,...
The Making of a Profession

The Making of a Profession

Looking back 20 years, there were fewer people with emergency management titles and less clearly defined emergency management organizational structures. There were also fewer certification and training programs for emergency managers. The profession has evolved along...
Understanding FEMA Verified Loss

Understanding FEMA Verified Loss

BATON ROUGE, La. — Applicants without an insurance policy may be eligible for FEMA help to restore a home to a safe, sanitary and secure condition following a disaster. FEMA assistance is not the same as insurance. Assistance only provides the basic needs for a...
Guide to Managed IT Services Now Available

Guide to Managed IT Services Now Available

SCHAUMBURG, Ill. – A new informative guide is available for businesses and organizations of all types and sizes to better understand and utilize Managed IT services. The Guide to Managed IT Services is a available as free download (see link below) from Prescient...
How “Fileless” Ransomware Works

How “Fileless” Ransomware Works

As ransomware becomes an increasingly lucrative business, organized crime groups are expanding their operations to reach more victims and extract more ransoms. Meanwhile, security measures are getting better at detecting and blocking ransomware, forcing cybercriminals...
KORE Awarded IoT Alliance of the Year

KORE Awarded IoT Alliance of the Year

KORE Partnership with Apple to provide Connectivity to Tablet Solution wins award from IoT Breakthrough   ALPHARETTA, Ga. – KORE, the people powering the Internet-of-Things (IoT) innovations and opportunities, today announced that its partnership with Apple...
Datavail Announces Acquisition of Navantis

Datavail Announces Acquisition of Navantis

Microsoft Consultancy Deepens Expertise in Application Development and Management BROOMFIELD, Colo. and TORONTO, Canada – Datavail, North America’s largest provider of managed services for data integration, management and database administration, today...