How to Mitigate Cybersecurity Risk As part of cybersecurity awareness month, IDG recently released its 2018 U.S. State of Cybercrime Study. The study underscored the reality that businesses of all sizes still struggle to effectively protect data and critical IT infrastructure from various cybersecurity threats – both external and internal. While most companies are steadily increasing the amount...
WHAT IS GDPR? The General Data Protection Regulation (effective May 2018) is a law designed to strengthen the data protection rights of individuals within the European Union (EU). GDPR applies not only to businesses located in the EU, but also to businesses that offer goods and services to individuals located in the EU. The expansive purview of the law...
Expedient Enterprise Cloud is VMware Cloud Verified! Expedient continues to be recognized as a leading provider of VMware-based cloud infrastructure. The company was recently named a VMware Cloud Verified partner, joining an exclusive group as one of just 8 infrastructure as a service (IaaS) providers in the U.S to achieve this status. The designation signifies that Expedient customers...
More than 9,000 CIOs and IT leaders converged on Orlando, FL this week to attend Gartner Symposium/ITxpo 2018 to improve IT strategy with knowledge gained from global business thought leaders and leading technology industry research. I’m happy to say, we weren’t disappointed! Throughout the week, several trends were ever-present including: Digital Transformation – Investment to exploit the unique...
Disaster recovery is usually a subset of activities around a larger business continuity initiative in an organization. For this article, we will describe disaster recovery, or DR, as the activities required to restore availability of the computing environment to the organization. IT teams inside organizations have been practicing DR for years, often by implementing do-it-yourself (DIY) DR in the form...
In a recent Gartner survey of risk, audit, and compliance executives, cloud computing ranked as the top risk concern. More specifically, these executives emphasized the potential of unauthorized access to sensitive or restricted information stored in the cloud, and the possibility that cloud-hosted data could be rendered inaccessible due to a service disruption on the cloud provider’s end. While...