The Business Continuity Fight of the Week: Real Clouds vs. Virtual Clouds?
What would you expect residents of Sydney to be doing Sunday afternoon and evening, 5 June 2016?
What would you expect residents of Sydney to be doing Sunday afternoon and evening, 5 June 2016?
If you use a cloud service or let your employees access company systems from their own smartphones, you’ve probably already noticed how your IT security perimeters has expanded.
System hacks, data breaches and information theft are frequently in the news, and will surely continue to feature strongly in 2016. However, recent crystal ball gazing by different actors and experts yielded an intriguing variety of predictions for the coming year. Broadly speaking, there are IT security trends we can expect, those we should suspect,…
Historically, vendor solutions for disaster recovery have been created for on-site use for individual enterprises. The client company concerned was the sole owner of the user data involved, and disaster recovery could be implemented without having to worry about anybody else. The cloud computing model changes that situation. It’s possible to use cloud services to…