May 30, 2014

Do I need backups?

Each time I am asked, I am stunned by the question “do we still need to do a backup if the server is replicated or has snapshots”? I believe[...]
Read More »

May 29, 2014

That is what we have always done

How many times have you encountered a “block” of a suggestion for improvement with a response of “That is what we have always done”?[...]
Read More »

May 22, 2014

Password security in the age of Cloud

How many passwords do you have? Do you remember them all? Do you use a password manager tool? Are your passwords complex and secure, or easy to guess dictionary[...]
Read More »

May 16, 2014

Threat and risk assessment

In today’s modern world, the task of threat and risk assessment is based on prior experience and history. It is human nature to be limited in our[...]
Read More »

May 16, 2014

My VCAP5-DCD experience

Last week I sat the VMware Certified Advanced Professional exam for Datacentre Design, and I wanted to share my VCAP5-DCD experience. Firstly, I need to[...]
Read More »

May 12, 2014

Business Impact Analysis questionnaire template

One of the first steps in preparing for a Business Continuity Plan and developing a Disaster Recovery Plan is to first identify the impact that your business[...]
Read More »

May 9, 2014

Bring Your Own Device policy risks

Many organisations have allowed staff to bring in their own device for use at work – these are Bring Your Own Device policies (BYOD Policy). It’s[...]
Read More »

May 8, 2014

The difference between BCP and DR

You may be one of the many people who ask what is the difference between BCP and DR – that is, what is the difference between a Business Continuity[...]
Read More »

May 2, 2014

Tips for defining your BYOD policy

Whilst defining your BYOD policy, you might miss some important requirements to producing a document that will help guide your employees when they use[...]
Read More »

Proudly powered by WordPress and Sweet Tech Theme