It’s nearly 2019, and what it takes for CIOs and other technology executives to be successful looks a lot different than it did as recently as say, 2014. Recently, I was quoted by two major technology news outlets about the role of technology executives in the success of their organizations:
From Hurricane Irene in 2011 to the “blizzard of 2013” that dumped two feet of snow across much of the state, Connecticut has seen its fair share of extreme weather. Not only do these natural disasters disrupt people’s daily lives and prevent them from coming into work, they also disable or damage critical business infrastructure and utilities such as power, electricity, and heating.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Not too long ago, I was interviewed for a Comcast Business blog post and Inc.com article about Wi-Fi security. As long as the Wi-Fi is up and running, the security of it isn’t something the average person gives a lot of thought to, but improperly secured Wi-Fi networks present a number of unique vulnerabilities hackers can exploit to gain access to sensitive data. To understand Wi-Fi security, it helps to know about these strategies that hackers use.
Earlier this week, the FBI urged thousands of small business and home office internet users to reboot their routers to prevent the impact of VPNFilter, the latest malware threat to businesses and consumers. Hours after the story broke, I was invited to WTNH News 8's studios to do a Facebook live Q&A.
Facebook is the latest highly recognizable company to make headlines for a data scandal with a staggering number attached. This time, it’s the profile data of 50 87 million users that was given without their consent to a third party who used their data to influence an election. In the cannon of major data breaches—Equifax, Target, Anthem, etc.—Facebook’s is a unique case with its own set of takeaways for businesses.
If you’re the IT director at your organization, you’re likely the first one to see the need for managed services such as Cybersecurity-as-a-Service and Network-as-a-Service. However, it can be tricky to convince your boss, who may be the CEO, CFO, or COO, that outsourcing part of the company’s IT to an independent vendor will be more than merely a new expense. Here’s a step-by-step guide to organizing and presenting your thoughts on managed service providers.
Desktop Environment Managers share several concerns about the challenges of managing a company’s desktop and laptop environment. Chiefly, they struggle with the maintenance of the separate images used to support both hardware and users. The quandary of simultaneously supporting operating systems during an upgrade is also a challenge.
At the heart of many of today’s high-value business applications are large repositories of business data stored on rotating magnetic disk. Although CPU performance is critical to the performance of many of these applications, I/O performance, or the ability to read and write data to and from the disk, is frequently even more critical. The more time an application spends waiting for data to be read from or written to disk, the more its performance will improve if I/O can happen with less delay.