article thumbnail

Cybersecurity e NIS2: come si muovono i CIO per dormire sonni (un po’) più tranquilli

CIO

Nella strategia per la protezione cyber rientrano un SOC (Security Operations Center), due data center proprietari che garantiscono la business continuity e il progetto, in corso di realizzazione, di un sito di disaster recovery presso il CED di Regione Campania.

article thumbnail

8 data strategy mistakes to avoid

CIO

Similar to disaster recovery, business continuity, and information security, data strategy needs to be well thought out and defined to inform the rest, while providing a foundation from which to build a strong business.”

Strategy 340
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Si può tornare indietro dal cloud? Ecco che cosa ne pensano i CIO italiani

CIO

I processi mission-critical, invece, solitamente si lasciano on-prem: chi fa produzione ha bisogno di macchine locali per garantire la business continuity. Da questi difficilmente si torna indietro, perché non ci si deve preoccupare più di backup, disaster recovery, versioning e così via”.

Cloud 130
article thumbnail

What COVID-19 Response Strategies Tell Us About the Business-Cybersecurity Disconnect

Tenable

Employees are suddenly connecting to core business systems and applications using their own previously untested — and potentially vulnerable — consumer routers and home networks. The popularity of internet-of-things (IoT) devices makes them potential threat vectors.

article thumbnail

An Introduction to Disaster Recovery with the Cloudera Data Platform

Cloudera

We now see customers taking advantage of its new capabilities and the value it brings to their business transformation, and asking “What’s next on my CDP journey?” . Why disaster recovery? Disaster recovery and business-continuity planning is primarily focused on managing and reducing risk.

article thumbnail

Top 5 Ways to Improve the Security of Your Business

Kaseya

The Internet of Things (IoT) and unsecured IoT devices are also proving to be a huge risk for SMBs. In 2017, 50,000 cyber-attacks were targeted at IoT devices, an increase of 600 percent from 2016 and the number of IoT-driven malware attacks surpassed 121,000 in 2018. There is always a weakness in the landscape.

Backup 87
article thumbnail

The Multi-Cloud Environment in 2020: Advantages and Disadvantages

ParkMyCloud

Improved disaster recovery/business continuity (40%) . Cloud providers’ unique capabilities – take advantage of offerings in AI, IOT, Machine Learning, and more. Here’s what they found: More than half (55%) of respondents use multiple public clouds: . 34% use two, 10% use three, and 11% use more than three.

Cloud 90