Topics: Disaster Recovery, Data Security
When in need of data storage, convenient file sharing capabilities, or expedient IT consultations, individuals and businesses often get nervous when considering the prospect of using cloud systems.
Topics: Cloud Computing, Data Security, IT Project Management
by: Ben Howard - IT Services Manager, CISSP
Google has recently released SSL for searches. It is on by default with Chrome, and you can access it at https://www.google.com. While this is not monumental security, earth shattering news, given the option for web traffic to use SSL, you should always, always use SSL. SSL encrypts the communication between your PC and the server to which you send a request adding another layer of data security. In this case, it means that your searches and search results will be encrypted. No one will be able to see what you searched for or what results you received without direct access to your PC. Sounds good, but this doesn’t mean no one can have any clue about your searches. While your searches and results are encrypted, if you click on a link, you will be redirected to another website. That website may or may not support SSL. So, while your ISP may not know that you searched for “free music download”, they will see that you accessed websites that allow you to illegally download music.
Topics: Data Security, Tech Fixes
Snapshot storage backup recovery works almost exactly how it sounds: by taking a photo of the computer hard drive at a particular moment in time. The replication occurs by copying a disk block when it is written or by using a split-mirror set of disks. When it is time to restore from snapshot backup, the result is almost instantaneous. Snapshot backup can deliver full, partial, file and even some differential database backups.
Topics: Disaster Recovery, Data Security
Topics: Disaster Recovery, Data Security