IT Security Policy: A Must Have

I know we all feel that we do our best when it comes to securing both the physical and tangible assets of our businesses. Most companies feel that by simply locking doors, controlling who has keys and alarm codes, changing passwords, and engaging in other basic...

Documenting Your Network – Part 4 of 5

The next two critical pieces of network documentation that you need to understand include the IT Recovery Guide and Business Process Analysis. IT Recovery Guide Now, this is not 12 steps for how IT recovers from drinking too much last night, but rather, the IT...
Head in the clouds?

Head in the clouds?

While “the public cloud” seems to be the thing to do these days, especially if you’re watching prime-time TV, it’s important to take a cautious approach to the cloud, especially with mission-critical applications. Companies need to weigh the options of public cloud...