Seguridad

Software y sistemas de seguridad de datos y privacidad

Endpoint Threats: Vulnerabilities to Eliminate

Digital information is arguably the most important asset for modern businesses, from financial data to customer demographics. The potential loss of customer or business data carries too heavy a risk to ignore, from regulatory fines to loss of brand trust and customers.

Despite the risks, businesses are using an increasing number of network-connected devices, many of which are not centrally managed or protected. Such devices grant attackers more potential routes into a system and create more points for businesses to protect..

How to Protect Your Data in 2019

The number and variety of threats to your business and personal data are always increasing. In 2019, attackers have become so sophisticated that it can be a struggle to stay ahead of them. As many as a third of organizations cannot protect their data from cybersecurity threats.
Read on to learn about some of the common data security threats, as well as a number of tools and practices that can help you protect your data in the event of a breach..

What is Storage Tiering and How Can it Reduce Storage Costs?

Tiered storageTiered storage is a way of managing data by assigning it to different types of storage devices/media depending on the current value that the underlying information provides. The efficient management of data recognizes that all information provides an intrinsic value from the time it’s created to the time it becomes obsolete and that this value changes over the information lifecycle.

The typical factor determining the value of information is how frequently you access it, however, policy-based rules can factor a number of other issues to determine information value. For example, old bank transactions, which might have a low value, could suddenly shift in value depending on special circumstances, such as a tax audit. This article discusses some pros, cons, and best practices for tiered storage..