Is Your Data Security Policy and Process Reasonable?

There are many data protection regulations, including the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLBA) of 1999 (Financial Modernization Act of 1999), and the European Data Protection Directive. These all have language regarding how an entity mustprotect personal information. Other regulations specify the destruction discarded personal information, as is the case with the Final Disposal …

Will Your Workers Be Using Tablets Instead of Laptops?

Microsoft, which has always had a huge enterprise presence, introduced the Surface Pro with the enterprise in mind. Now, Apple with the iPad Pro and Google with Pixel C have also introduced tablets with keyboards, USB ports and other features that enterprises value.  Although these “pro” or enterprise versions cost more than the consumer targeted …

The “Shellshock” Bug – Bigger Than Heartbleed?

If you are an IT professional, then the mayhem following the exposure of the Heartbleed vulnerability is probably still fresh in your mind. Though only a few months have passed since that exposure in April, a new bug has recently surfaced. Last Wednesday, a major flaw was discovered in the Bash shell, one of the most widely …

Storage Array Controllers Need to Catch Up to SSD Performance

Solid State Drives (SSDs) have been around for a while.  As the cost has come down and speed and capacity has gone up, there has been a major shift from magnetic hard drives to SSDs in in data center and cloud storage systems. Not everyone is switching, and many data centers still have both types …

Spending Millions on Data Security?

Due to the many breaches that have been in the news in recent years, data security is a hot topic throughout the technology sector. Industry experts have worked around the clock to devise better firewalls, data encryption, end-point protection, and network monitoring, and enterprises are investing millions of dollars into these systems and technology. What …

ITAD Companies Are Not All the Same! How to Pick the Best for You.

The best partners for your business are those who are going to be there for the long haul. For an enterprise to function at an optimal level, you must align yourself with long-term partners that you can always count on — ones that “have your back,” if you will. It is true that almost every …

7 Challenges of an Office Liquidation or Move-Out for IT Managers

Closing down or moving a corporate office is a lot of work and usually includes a deadline that’s not negotiable. Property, facility and IT managers are, unfortunately, sometimes thrown into this challenging situation. Whether your company experiences a merger, reorganization, consolidation, downsizing, bankruptcy, liquidation, acquisition, relocation, or the closing of a division or data center, …

How Many Devices Does Each Employee Use for Work?

People are working anytime, anywhere.This is part of what’s driving an increase of the usage of data across mobile networks. This has a lot to do with more reliable networks and cheaper carrier data plans, in addition to the proliferation of devices. The ubiquity of public and private wi-fi, whether secure or not, is also …

How Wearable Technology Should Work Within Your ITAD Program

In the past few years, the introduction of devices like Google Glass and Apple’s iWatch have brought the discussion of wearable technology to the forefront. Both of these items have proven to be quite popular and we’re sure to see a number of variations in the coming years. So is the wearable technology trend something that …

Are You Using NIST 800 for Corporate IT Security?

The US Department of Defense (DoD) data and cyber security standards have been dropped, and DoD security standards now all reference the NIST 800 security framework. Whether this article will act as a refresher course or as new information, what we’d like to do is provide a quick overview of the NIST 800 Series, with …