As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

New Technology Requires New Hires

New Technology Requires New Hires

Organizations Must Invest in Professionals Needed to Ensure Successful Digital Transformation As technology becomes an increasingly essential driver of business success for enterprises around the world, determining how to effectively and securely pursue digital...
Why the future belongs to standards

Why the future belongs to standards

A quick glance at the accelerating technological change over recent years, and the subsequent upheavals, could be enough to make us all fear for the future of the global economy. However, there are good reasons to be hopeful: the rapid changes in today’s...

BT4-05 Editorial

What are the top 3 threats to organizations today? According to the 2017 BCI Horizon Scan Report: 1. Cyber attack (e.g. malware, denial of service), 2. Data breach (i.e. loss or theft of confidential information), 3. Unplanned IT and telecommunications outages. These...

BT2-01 Editorial

What are the Top-3 threats to organizations today? External threats. The top ones would be cyber/destructive resiliency issues, EMP pulse and nuclear attack on us or allies. I think the internal threats are worse – complacency, insufficient exercising and...

BT7-01 Editorial

What are the Top-3 threats to organizations today? Cyber Crime – Insider Remote/Traveling Employee Safety Cyber Crime – External   What areas of BC/DR do you think organizations should be investing in to secure their resiliency for the next 3-5 years?...

BT5-04 Editorial

What are the Top-3 threats to organizations today? The top threats that most organizations are currently concerned about are cyberattacks, data breaches, and physical security. However, in reality, organizations face a variety of different types of risks and threats...

BT4-03 Editorial

What are the top 3 threats to organizations today? Cybersecurity (hackers, malware, ransomware, data loss or breach, mobile devices, etc.) Workplace violence Loss of critical skillsets, institutional knowledge, and general business knowledge   What areas of BC/DR...

GS-3 & SAT-2 Editorial

What are the Top-3 threats to organizations today? From a business continuity perspective, I see the biggest threats to organizations as cyber-attacks, terrorism, and communications/network failures.   What areas of BC/DR do you think organizations should be...

SWS-2 Editorial

What are the Top-3 threats to organizations today? Outsourcing or third-party risk: Organizations must provide oversight of third-party providers. You can outsource the work, but you cannot outsource the risk/responsibility. The fact is, your company can have the best...

ST-4 Editorial

What are the top 3 threats to organizations today? Weak or lack of exercising plans and providing business continuity training and awareness. Lack of consistent, frequent and updated training on new threats/issues. We often see that exercising and training are often...

BT2-04 Editorial

What are the Top-3 threats to organizations today? Data breaches or ransomware Unplanned cloud services or it downtime Natural disasters   What areas of BC/DR do you think organizations should be investing in to secure their resiliency for the next 3-5 years?...

BT6-01 Editorial

What are the top 3 threats to organizations today? A. Cyber ransom. B. Severe weather. C. Supply chain risk   What areas of BC/DR do you think organizations should be investing in to secure their resiliency for the next 3-5 years? (Where should they put their...

SWS-4 Editorial

What are the Top-3 threats to organizations today? Insiders, outsiders becoming insiders, and ransomware.   What areas of BC/DR do you think organizations should be investing in to secure their resiliency for the next 3-5 years? (Where should they put their...

BT2-02 Editorial

What are the Top-3 threats to organizations today? This is a tough question because I think it very much depends on what organization you are in. For me, being part of a fortune 500 tech company, we are always challenged with diversifying our product, increasing...

ST-6 Editorial

What are the Top-3 threats to organizations today? 1. Security: Intellectual property theft and corporate cyber espionage; Malware attacks and Partner cyber intrusions causing reputation damage. 2. Strategic Risk: Failure to properly identify risks that impact the...
WS-3 & POC-2

WS-3 & POC-2

What are the Top-3 threats to organizations today? My research and my recent experience with dozens of companies this year has led me to believe that the top three threats to organizations today are: Cyber attack Loss of your data network The change in the news media...
Should You Go Colo?

Should You Go Colo?

By Gabe Gambill, VP of Product & Technical Operations at Quorum When it comes to an effective disaster recovery strategy, your team has several options. You can maintain your own DR site in a remote location, handle it on-site or go with a DRaaS solution....
WINTER WORKPLACE SAFETY TIPS

WINTER WORKPLACE SAFETY TIPS

Keep Your Employees Safe This Winter While some view winter weather as a welcomed excused absence from work or school, others must still find their way into the office. What they don’t want to encounter on their way are slick sidewalks, power outages, or the...
What’s Our Plan For That?

What’s Our Plan For That?

That question usually comes from an executive after some other organization has a business crisis that makes global or national headlines. The question causes anxiety in many Business Continuity Planners. I remember the first time I got that question. A...
New Alert System Launches in St. Louis County

New Alert System Launches in St. Louis County

(TNS) – The 1992 benzene spill in Superior is a rare example of an incident that prompted Twin Ports authorities to order a mass evacuation.But the efforts undertaken to alert the public about that hazard bear little resemblance to how a similar situation would...
BackupAssist Closes 2017 On A High Note Across Virtually Every Facet of Business – From Product and Services Innovation, to Channel Partner and End Client Endorsement, to Industry Analyst Validation

BackupAssist Closes 2017 On A High Note Across Virtually Every Facet of Business – From Product and Services Innovation, to Channel Partner and End Client Endorsement, to Industry Analyst Validation

BackupAssist Disaster Recovery Software and CryptoSafeGuard Ransomware Protection Solutions Chosen by Channel Partners and Small and Medium Enterprises (SMEs) Around the World   MELBOURNE, Australia and BOSTON – BackupAssist®, a leading provider of...
Planning for High-Speed Data Center Migration

Planning for High-Speed Data Center Migration

Big Data, mobility and the Internet of Things (IoT) are generating an enormous amount of data, and data center operators must find ways to support higher and higher speeds. Many data centers were designed to support 1-gigabit or 10-gigabit pathways between servers,...
You can’t stop crazy: Part 2

You can’t stop crazy: Part 2

A suicide bomber attempting to blow up the NYC subway, nut jobs plowing through pedestrians, active shooters killing innocents, and deadly wildfires and hurricanes have saturated our news for months. From workplaces like yours, lives have been taken, injuries...
Social Media Martketing

Social Media Martketing

Social Media Marketing It’s a new era of communication and marketing. Companies and brands must take advantage of the power of social media to stand out in a crowded digital world. The DRJ social media platform is one of the best ways for you to connect with...
EM: Run, Hide and Fight

EM: Run, Hide and Fight

(TNS) – Facing an active shooter situation may be as likely as getting struck by lightning, but that doesn’t mean lightning never strikes.That was the warning given to University of Idaho faculty, staff and students as part of an active shooter response...
New County Radio System Could be Costly

New County Radio System Could be Costly

(TNS) – The Saline County, Kan., Commission Tuesday approved the purchase of hardware to enhance the 911 system.Computer Technology Director Brad Bowers said the software from Tyler Technologies will cost $31,435, with the city of Salina paying half of that...
Five Edge Data Center Myths

Five Edge Data Center Myths

With mobile and last-mile bandwidth coming at a premium and modern applications needing low-latency connections, compute is moving from centralized data centers to the edge of the network. But there a lot of myths about edge data centers. Here’s what...
8 Top Tips for Beating the Big Data Deluge

8 Top Tips for Beating the Big Data Deluge

Big data applications are growing as organizations mine their data for insights about clients, suppliers and operations. But as capacities grow and data becomes more sensitive, the underlying storage remains an important consideration. Here are ten tips on how data...
Top Five Emerging Cybersecurity Trends for 2018

Top Five Emerging Cybersecurity Trends for 2018

Netwrix sums up the top cybersecurity trends that will define the way organizations develop their IT strategies in the coming year IRVINE, Calif. – Netwrix Corporation, provider of a visibility platform for user behavior analysis and risk mitigation in hybrid...
10 Cybersecurity Threats and Trends for 2018

10 Cybersecurity Threats and Trends for 2018

Tech Security Firm SpiderOak Warns of Nightmare Scenarios to Come   “As organizations and individuals become increasingly reliant on IoT for critical functions, the risks that we are taking are becoming greater and greater,” says Christopher Skinner,...
Violin® Announces Issuance of Patent

Violin® Announces Issuance of Patent

SAN JOSE, Calif. – Violin Systems LLC (www.violin-systems.com), the industry pioneer in All Flash Arrays, today announced that the United States Patent and Trademark Office has issued to Violin United States Patent No. 9,384,818.  For more information on...
Trends and Threats in Mobile Security

Trends and Threats in Mobile Security

Today there are more households with mobile devices than with desktop computers. According to the Pew Research Center, 84 percent of US households have a median of two smartphones, while only 80 percent have a median rate of one desktop or laptop computer. In fact, 95...
Graduating from Single Server Databases

Graduating from Single Server Databases

The database market has evolved over the decades on the incredible efforts of several single server databases including Oracle, Microsoft SQL Server, PostgreSQL, MySQL, and MariaDB. There are many more; however, these few have furthered the industry with a recipe for...
4 Major Audit Risk Themes For 2018

4 Major Audit Risk Themes For 2018

Prepare to Plan or Plan to Fail As Audit teams start thinking about their 2018 plans, being able to identify new trends in emerging risk areas that threaten to disrupt enterprise performance over the next year is critical. This explains 12 risks, connected by four...
Active Shooter Response Plan

Active Shooter Response Plan

As of October 2017, the United States has seen 273 mass shootings this year alone. Due to the recent active shooter events across the US, it is increasingly imperative to create a response plan. In the event of an active shooter scenario, government agencies need to...
MANAGE WINTER STORMS WITH EVENT PAGES

MANAGE WINTER STORMS WITH EVENT PAGES

Is Winter That Dangerous? Sure, spring, summer and even early fall months generally bring us more severe weather, such as hurricanes, tornadoes, and strong thunderstorms, but the winter months can wreak their own havoc. We pulled the following common winter dangers...
ITSM and the Scourge of Server Sprawl

ITSM and the Scourge of Server Sprawl

In theory, IT service management should contain sprawl, limiting or preventing the spread of underutilised IT assets. Any organisation that prides itself on being lean will recognise the contradiction in multiplying the number of half-used servers that then take up...