As I mentioned in my last post, 68% of those in organizations committed to a multi-site resilience strategy – e.g., using Disaster Recovery as a Service (DRaaS) , shifting IT infrastructure to a managed service provider environment , or deploying hybrid solutions – have confidence that their IT environments will perform as expected during unplanned downtime.
Whether it’s a complex corporate merger like the one Maria Gollnick of BloodSource has dealt with (see page 1 of our Strategic Advisor Newsletter) or, say, the shifting of an on-site infrastructure to a cloud environment, the challenges of merging/ consolidating IT infrastructures can be overwhelming.
Even modest consolidation involves networks, data centers, hardware, applications, clouds, backup plans, security policies, business and compliance processes, anticipating future needs and technologies, and more — all of which must be understood and then integrated into a new, efficient IT environment.
Regardless of any given IT infrastructure consolidation’s particulars, they all share these three imperatives, on which you should focus before beginning the actual work of merger/consolidation:
Your answer may depend on your job title. In one recent survey , 70% of C-level executives declared their firms “very prepared” – but fewer than half of the IT people at those same companies agreed.
Uh oh.
Those of us devoted to securing enterprises can tell you that cybercriminality will grow significantly as it continues to exploit current information technology trends – widespread adoption of mobile devices and apps, increasing realization of the vast potential of IoT (Internet of Things), and the intensifying digital interconnectedness of nearly everything.
A commitment to the seven people-focused cybersecurity best practices I reviewed in my last post will thwart many attacks. But don’t forget these 10 key cybersecurity best practices basics:
If you have taken note of enterprise network security over the years, you’re aware of security best practices basics, which are also applicable to ransomware: layer your security defenses, back up your data, keep your software patched…






