Decommissioning a data center is a complex undertaking. For our clients, maximizing return on investment while mitigating risks is usually at the top of their list and with good reason. Decommissioning a data center is serious business and there are so many elements to consider.
12 QUESTIONS FOR DETERMINING WHETHER YOUR BUSINESS MEETS IT SECURITY COMPLIANCE STANDARDS
In this fast-paced era of IT technology, data security and data breach prevention should be at the top of every company’s priority list. Protecting and properly disposing of data should be a big part of business operations and costs.
3 GUIDELINES FOR PREVENTING INFORMATION THEFT FROM HARD DRIVES
Ignorance is bliss, right? Well, not always. When it comes to discarding old and used computer hard drives, ignorance can get you into a lot of hot water. Leaving data on old computers intended for lease return, remarketing or recycling can be very dangerous for your customers, clients and your company.
WHY ELIMINATE Y2K PROGRAMS [OR NOT]?
Y2K was literally a 2 bit (actually byte) problem. From the beginning of software coding to the age of mass storage devices and voluminous RAM capacity, roughly mid 1940’s to the late 1970’s, “software engineering” always had to have an eye on space to run and store their code and data, not to mention the ever present “runtime” concerns and computer cost.
4 GUIDELINES FOR REDUCING SECURITY RISKS IN THE CLOUD
We have all heard the trendy tech phrase, “the cloud”. The cloud (outlined nicely in this Beginner’s Guide to the Cloud by the online news outlet Mashable for those of you who are not familiar) is a very abstract term used to describe a network of servers, each with a different function – some of them responsible for storing data.