Zetta Outlines Immediate Steps to Take if You’ve Been Hit with Ransomware

New Ransomware Prevention Checklist Provides Actionable Steps to Recover from and Prevent Costly Cyber Attacks   SUNNYVALE, Calif.  – Zetta, a leading provider of high-performance business continuity solutions, today released a new Ransomware Prevention Checklist which provides actionable advice to help recover from and prevent ransomware attacks. It includes immediate steps that can be taken when infected by… Continue reading Zetta Outlines Immediate Steps to Take if You’ve Been Hit with Ransomware

Alliance Storage Technologies Announces NETArchive Version 2, the Industry’s Premier Archiving, Management, Optimization and Data Protection Solution

New Release Incorporates Industry-Unique Modular Architecture Consisting of High Performance Disk, Cloud and Optical Tiers with Unrivaled Performance and Capacity – At a Price Comparable to Tape   COLORADO SPRINGS, Colo. –Alliance Storage Technologies, the leading provider of optical, and cloud data archiving solutions, today announced NETArchive® version 2 high performance storage offering customers major advancements in performance,… Continue reading Alliance Storage Technologies Announces NETArchive Version 2, the Industry’s Premier Archiving, Management, Optimization and Data Protection Solution

Move your Crisis Management Team to Incident Command System – Salt River Project Did

We have been a fan of the Incident Command System (ICS) since the 1990s. It was created in my fair state – California – to manage wildfires. Everyone realized early on, it had many more uses that just the fire service.  It it now required for all city, county, state and federal departments and agencies.… Continue reading Move your Crisis Management Team to Incident Command System – Salt River Project Did

The cybersecurity principle of the locked door

You lock your home—now lock your network. This means having a reliable and secure data center and following basic safety rules, like locking down ports, shutting off services, removing rights and privileges when no longer justified, and using firewalls. You’ll also need host and network intrusion detection and prevention (IDS/IPS) as well as physical access… Continue reading The cybersecurity principle of the locked door

THE DEFINITION AND RISK OF TERRORISM IS SHIFTING

A man drives a car into pedestrians on Westminster Bridge, keeps driving, crashes the car outside the Houses of Parliament, then tries to enter the complex armed with a knife. Four people are dead, including a policeman and the assailant, and at least 40 injured. The investigation into yesterday’s terrorist attack in the heart of London is ongoing, as Westminster… Continue reading THE DEFINITION AND RISK OF TERRORISM IS SHIFTING

Agility Recovery Announces myAgility 3.0, Disaster Recovery Planning Tool

Application and Portal Make High Performance Disaster Recovery Available to Everyone   DENVER – Agility Recovery, North America’s premier provider of business continuity and post-disaster recovery solutions, today announced myAgility 3.0, a business continuity planning and management platform and mobile application built to accommodate enterprise deployments. myAgility 3.0 is easy-to-use for small and medium business customers… Continue reading Agility Recovery Announces myAgility 3.0, Disaster Recovery Planning Tool

Federal EPA cites Sabey Data Centers as leaders in energy efficiency

Intergate.Quincy facility receives federal EPA ENERGY STAR® certification for superior energy efficiency with the highest possible green score  SEATTLE, Wash. – Sabey Data Centers, one of the largest privately-owned data center owners, operators and developers in the United States, announced today that its Intergate.Quincy facility in Central Washington has earned the U.S. Environmental Protection Agency’s 2017 Energy… Continue reading Federal EPA cites Sabey Data Centers as leaders in energy efficiency

Veritas Equips Organizations with Systematic Approach to Address GDPR Globally

Integrated solution helps organizations gain visibility, take action and assume control over personally identifiable information under management   MOUNTAIN VIEW, Calif. – Veritas Technologies, the leader in information management, today unveiled an integrated solution that will help organizations directly address the forthcoming General Data Protection Regulation (GDPR). This solution gives enterprises around the world the… Continue reading Veritas Equips Organizations with Systematic Approach to Address GDPR Globally