article thumbnail

Generac powers business transformation with data, AI

CIO

Being a company’s first CIO provides room to make your mark, and Generac Power Systems’ Tim Dickson has done just that, moving swiftly to help transform the backup generator manufacturer into an energy technology company.

article thumbnail

When least privilege is the most important thing

CIO

The Internet of Things is not exempt from least privilege Another nightmare is built into the Internet of Things (IoT). Many of these IoT devices have no internal security to speak of, yet we are giving them access to our networks and often to the Internet. Some companies want third-party backup solutions for their cloud services.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What is a managed service provider? Strategic outsourcing for IT services

CIO

Another area of growth for MSPs has been in providing internet of things (IoT) services, with 50% of MSPs seeing IoT as a significant revenue opportunity, according to CompTIA.

article thumbnail

Avoiding Last-Mile Challenges for Remote Workers

CIO

This needs to be a multidimensional review: Computational requirements Storage requirements (local, remote, and backup) Voice communication requirements Video communication requirements Security requirements Special access requirements (e.g. In other cases they can be used as a backup. cellular, air-gapped systems, etc.)

Backup 208
article thumbnail

Cybersecurity e NIS2: come si muovono i CIO per dormire sonni (un po’) più tranquilli

CIO

Nella strategia per la protezione cyber rientrano un SOC (Security Operations Center), due data center proprietari che garantiscono la business continuity e il progetto, in corso di realizzazione, di un sito di disaster recovery presso il CED di Regione Campania.

article thumbnail

How Huber spurs innovation in a historically decentralized business

CIO

With our decentralized structure, we had a lot of data centers and hosting providers. As plants have become more digital and network based, though, there’s a need for IT to cross over to cover data, security, backup, recovery, and redundancy. IoT in the production lines creates a lot of data.

article thumbnail

Cybersecurity Snapshot: NSA Picks Top Cloud Security Practices, while CNCF Looks at How Cloud Native Can Facilitate AI Adoption

Tenable

Protect cloud data via, for example, enforcing least privilege; creating immutable backups; and using object versioning. Employ secure cloud key-management practices. Implement network micro segmentation and end-to-end encryption. Use infrastructure-as-code to automate deployment of cloud resources. “The