The security industry has a bit of a boy-who-cried-wolf problem. Every potential threat is maximally hyped, to the point where no one knows what they should take seriously or dismiss as marketing spin or simple overreaction.
And if you’re a shepherd, everything that moves starts looking like a wolf. Particularly if you’re a shepherd that specialises in anti-wolf security suites, right?
But in the same way that locking your front door is always worth it – even if a full-blown, code-secured gate is overkill – basic email security is a no-brainer.
You wouldn’t send a personal letter to someone without putting it in an envelope, so why let your emails fly without... Read more
With cloud-based systems and modern Linux system administration tools, developers can launch a new server (or many) with a click and call themselves DevOps.
Some systems management tools such as Red Hat Satellite Server, Nagios and Puppet simplify server configuration. For most organisations, the days of hand configuration for each server for a specific role are past.
A Standard Operating Environment (SOE) and a suitable Management Platform (SOEMP) is essential to prevent costly server proliferation and maintain version control. In a complex environment, several different SOEs will be needed for different tasks.
Is the Sysadmin function dead? No, however, it’s... Read more
“All value of the field of IT is associated with applications” – Bernard Golden.
So you need to make the most of them. And there’s a lot of hype around the public cloud as a home for your applications. And its justified: whichever angle you take – cost, ease of access, maintenance, scalability, elasticity, versatility – the cloud is better than on-premises. The effect of which is that you can accelerate your application lifecycle, build better apps, faster, and beat your competition.
On paper at least.
But moving an application to the public cloud – when it’s not ready for the cloud – is the technological equivalent of buying an ice cream and just watching it... Read more
The unsung hero of ecommerce: how to use a single, centralised database to supercharge your online sales!
Our database experts will be going through the finer points of database management with the goal of:Optimising application performance Avoiding inefficiencies Tuning monitoring and alerts
The webinar will be held on 29th September at 4 pm!First name * Last name * Email * Company Phone Number
On October 1st, 1962, Vassili Arkhipov – a Russian submarine commander – saved the world.
Two of his fellow commanding officers, having been out of contact with Moscow for a number of days, thought that... Read more
Ever known someone who just sucks at communicating? Who can’t be honest about how they feel?
“I love you.”
That person is fooling no one. Except perhaps their partner. Unnecessary pain ensues.
Take-away: communicating openly with other human beings reduces suffering. But it’s very hard to do – which is precisely why it’s so valuable.
In the IT world, things are no different. If resentments build between individuals or teams, information is withheld, a sense of competition prevails, an unwillingness to take responsibility develops or any other kind of organisationally-maladaptive behaviour emerges, unnecessary pain will... Read more
How much of a threat are your competition?
Perhaps you work in an industry that has enormous barriers to entry and is full of old-school techies who are quite happy to bob along with the status quo. If so you can stop reading here, kick back, light up an enormous Cuban cigar, and chuckle quietly to yourself.
The likelihood is, however, that your competition is pretty tech-savvy and reasonably on-the-ball when it comes to getting innovative new products and services to market sooner rather than later.
And that keeping up with these folks – to say nothing of getting one up on them – requires quite a lot of hard work on your part.
At the same time, your... Read more
You want your business to run tediously smoothly. To be boringly uneventful. ‘Business as Usual’ (BAU) is your goal.
There are three fundamental elements that make up your business and that should all be available and working together in depressingly cadent synchronicity: people, offices and systems.
The ability to keep running as a business after any event that disables or inhibits any of these fundamental elements – that stops BAU – is Business Continuity (BC).
To maintain the cringe-worthily efficient running of your business at all times, you need to carefully define how your business is going to react in the face of events that could disrupt your people, your... Read more
Last week, the United Kingdom voted to leave the EU, throwing up huge questions over the future of the country. Among the biggest are those surrounding competitiveness of the pound and the economy as a whole, and, in the IT industry, the questions are flying as thick and fast as anywhere else.
What is going to happen?
Perhaps there will be changes regarding data sovereignty. The EU General Data Protection Regulation is set to come into force in 2018, at which point Britain may not have completed the process of leaving the EU. Perhaps due to related concerns data centres will cease being built in the UK as uncertainty makes it an unattractive proposition compared to Germany... Read more
Just put it in the public cloud. Easy peasy.
Simple as putting something on a shelf, surely? But with less chance of putting your back out, like you did last Christmas reaching for that tinsel right at the back of the cupboard.
But as you know, the public cloud is not that simple. AWS might be pretty good, but you’ve still got to get there, which means you have to go over the public internet, a task which carries the technological risk equivalent of taking down a box of Christmas decorations after a quart of eggnog.
So, the public cloud doesn’t exist in a silo. It has to be integrated into your IT estate, and the network is the connecting piece.
If your... Read more
A cybersecurity breach costs on average $3.5 million. Typically, it goes undetected for 209 days, and it takes 32 days to respond appropriately once it has been detected . To make matters worse, there is a one million person shortfall in security experts, according to CISCO .
So whether or not your organization is prepared for a cyberattack could be the difference between success and failure. Here’s the outline of a plan:
The most important part of a plan is the objective.
What part of your business do you want to protect? Is protecting your reputation the number one priority? Or protecting revenues? Uptime for your customers’ services?... Read more