Archive of posts from 2018

Six Strategies to Reduce Cybersecurity Risk

Six Strategies to Reduce Cybersecurity Risk

Jonathan Rosenson
Read Time 5 min Read

How to Mitigate Cybersecurity Risk As part of cybersecurity awareness month, IDG recently released its 2018 U.S. State of Cybercrime Study. The study underscored the reality that businesses of all sizes still struggle to effectively protect data and critical IT infrastructure from various cybersecurity threats – both external and internal. While most companies are steadily increasing the amount...

Support GDPR Compliance with Expedient

Support GDPR Compliance with Expedient

Jonathan Rosenson
Read Time 4 min Read

WHAT IS GDPR? The General Data Protection Regulation (effective May 2018) is a law designed to strengthen the data protection rights of individuals within the European Union (EU). GDPR applies not only to businesses located in the EU, but also to businesses that offer goods and services to individuals located in the EU. The expansive purview of the law...

Expedient Announces VMware Cloud Verified Designation

Expedient Announces VMware Cloud Verified Designation

Jonathan Rosenson
Read Time 2 min Read

Expedient Enterprise Cloud is VMware Cloud Verified! Expedient continues to be recognized as a leading provider of VMware-based cloud infrastructure. The company was recently named a VMware Cloud Verified partner, joining an exclusive group as one of just 8 infrastructure as a service (IaaS) providers in the U.S to achieve this status. The designation signifies that Expedient customers...

Is your Organization ContinuousNEXT?

Is your Organization ContinuousNEXT?

Jonathan Rosenson
Read Time 4 min Read

More than 9,000 CIOs and IT leaders converged on Orlando, FL this week to attend Gartner Symposium/ITxpo 2018 to improve IT strategy with knowledge gained from global business thought leaders and leading technology industry research. I’m happy to say, we weren’t disappointed! Throughout the week, several trends were ever-present including: Digital Transformation – Investment to exploit the unique...

What Steps Have You Left Out of Your Disaster Recovery Strategy?

What Steps Have You Left Out of Your Disaster Recovery Strategy?

Doug Theis
Read Time 5 min Read

Disaster recovery is usually a subset of activities around a larger business continuity initiative in an organization.  For this article, we will describe disaster recovery, or DR, as the activities required to restore availability of the computing environment to the organization. IT teams inside organizations have been practicing DR for years, often by implementing do-it-yourself (DIY) DR in the form...

Five Strategies to Mitigate Cloud Risk

Five Strategies to Mitigate Cloud Risk

Jonathan Rosenson
Read Time 7 min Read

In a recent Gartner survey of risk, audit, and compliance executives, cloud computing ranked as the top risk concern. More specifically, these executives emphasized the potential of unauthorized access to sensitive or restricted information stored in the cloud, and the possibility that cloud-hosted data could be rendered inaccessible due to a service disruption on the cloud provider’s end. While...