Paul Kirvan Independent IT consultant/auditor Security The top secure software development frameworks 09 May 2022 Data Center How much energy do data centers consume? 25 Apr 2022 Storage How can organizations prepare for a data storage audit? 21 Apr 2022 Security Pen testing guide: Types, steps, methodologies and frameworks 07 Apr 2022 Security Open System Authentication (OSA) 07 Apr 2022 Storage SSD form factor 04 Apr 2022 Data Center data center resiliency 04 Apr 2022 Disaster Recovery How AI adds value to crisis communications systems 29 Mar 2022 Disaster Recovery How to calculate maximum allowable downtime 28 Mar 2022 Security How to overcome GDPR compliance challenges 24 Mar 2022 Networking application layer 22 Mar 2022 Security mutual authentication 21 Mar 2022 Security How to write an information security policy, plus templates 11 Mar 2022 Storage What to look for in a green cloud storage provider 10 Mar 2022 Storage write endurance 10 Mar 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Maintenance and continuous improvement 09 Mar 2022 Data Center hot/cold aisle 28 Feb 2022 Networking Network Time Protocol (NTP) 28 Feb 2022 Data Center computer room air handler (CRAH) 17 Feb 2022 Security Why companies need cybersecurity and cyber resilience 15 Feb 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Staff training, incident and media management 08 Feb 2022 Data Center utility computing 04 Feb 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Setting strategy and developing plans 27 Jan 2022 Security Build a strong cyber-resilience strategy with existing tools 26 Jan 2022 Security Top cloud security standards and frameworks to consider 21 Jan 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Assessing risk and business impact 19 Jan 2022 Storage Tips to reduce the environmental impact of data storage 27 Dec 2021 Security Top 10 IT security frameworks and standards explained 21 Dec 2021 Security How to create a company password policy, with template 30 Nov 2021 Cloud Computing cloud audit 23 Nov 2021 Disaster Recovery What is the role of qualitative and quantitative impact in DR? 16 Nov 2021 Storage How to effectively plan cloud storage scalability 15 Nov 2021 Mobile Computing satellite 15 Nov 2021 Networking How zero-trust SDP can work with a VPN for remote work 15 Nov 2021 Disaster Recovery Prepare a supply chain disaster recovery plan 10 Nov 2021 CIO How can IT teams better manage shadow IT? 09 Nov 2021 Security Steps for building a privacy program, plus checklist 05 Nov 2021 Unified Communications VoIP caller ID (voice over Internet Protocol caller identification) 05 Nov 2021 Data Center single point of failure (SPOF) 04 Nov 2021 Networking What are the 6 components of structured cabling? 04 Nov 2021 Security Report on Compliance (ROC) 03 Nov 2021 Disaster Recovery How to calculate and reduce MTTR 01 Nov 2021 Storage Perform data storage testing to prevent issues 29 Oct 2021 Storage tape drive 28 Oct 2021 Storage Understand your storage infrastructure management 28 Oct 2021 Security Securities and Exchange Commission (SEC) 27 Oct 2021 Storage RPO vs. RTO: Key differences explained with examples, tips 22 Oct 2021 CIO 14 potential costs of shadow IT 20 Oct 2021 Storage Data retention and destruction policy template: A free download 20 Oct 2021 Storage storage capacity planning 18 Oct 2021 CIO How to evaluate and select GRC vendors and tools 12 Oct 2021 CIO 7 risk mitigation strategies to protect business operations 12 Oct 2021 CIO 4 basic types of business risks in the enterprise 12 Oct 2021 CIO key risk indicator (KRI) 12 Oct 2021 Security governance, risk management and compliance (GRC) 12 Oct 2021 CIO 6 dangers of shadow IT and how to avoid them 07 Oct 2021 Data Backup Backup scheduling best practices to ensure availability 07 Oct 2021 Disaster Recovery Prepare and conduct a ransomware tabletop exercise 04 Oct 2021 Networking Remote access vs. site-to-site VPN: What's the difference? 04 Oct 2021 Disaster Recovery IT risk assessment template (with free download) 01 Oct 2021 Storage Implement data storage policy with guidelines, free template 30 Sep 2021 Security How to create a ransomware incident response plan 30 Sep 2021 Security 17 ransomware removal tools to protect enterprise networks 10 Sep 2021 Security How to remove ransomware, step by step 09 Sep 2021 Disaster Recovery Top mass notification system vendors and how to choose one 31 Aug 2021 Disaster Recovery Use ISO 22332 to improve business continuity plans 30 Aug 2021 Storage Adopt data storage security standards to ensure compliance 25 Aug 2021 Disaster Recovery Fortify emergency communications systems with a business plan 19 Aug 2021 Disaster Recovery Make a power outage business continuity plan with these tips 18 Aug 2021 Storage Top 10 data storage issues and how to overcome them 06 Aug 2021 Disaster Recovery Build a BCDR employee training program for peak resilience 29 Jun 2021 Security Mitigate threats with a remote workforce risk assessment 29 Jun 2021 Disaster Recovery Organizational resilience questionnaire for recovery teams 28 Jun 2021 Disaster Recovery 12 skills business continuity managers need to succeed 24 Jun 2021 Networking How to use two VPN connections at the same time 22 Jun 2021 Networking 10 Gigabit Ethernet (10 GbE) 10 Jun 2021 CIO An adequacy audit checklist to assess project performance 24 May 2021 Security Create a remote access security policy with this template 20 May 2021 Disaster Recovery The tiers of disaster recovery, explained 14 May 2021 Disaster Recovery How do risk assessment costs vary and why? 13 May 2021 Security How to successfully automate GRC systems in 7 steps 07 May 2021 Security 12 Microsoft Exchange Server security best practices 09 Apr 2021 Security Exploring GRC automation benefits and challenges 09 Apr 2021 Networking Best practices for VPN traffic monitoring 02 Apr 2021 Storage How to develop and implement a data storage plan 31 Mar 2021 Disaster Recovery Create an incident response plan with this free template 30 Mar 2021 Disaster Recovery Prepare for the unknown with an organizational resilience model 29 Mar 2021 Disaster Recovery How to establish an operational resilience training program 23 Mar 2021 Data Backup Which backup standards guide a data protection strategy? 18 Mar 2021 Disaster Recovery Operational resilience frameworks hinge on breaking down silos 12 Mar 2021 CIO 14 need-to-know tips for digital transformation success 09 Mar 2021 CIO 10 ways the pandemic changed digital transformation 09 Mar 2021 CIO Build a digital transformation roadmap in 6 steps 08 Mar 2021 Data Backup Top 3 backup and recovery requirements for data protection 26 Feb 2021 Disaster Recovery Bolster an operational resilience strategy with these tips 18 Feb 2021 Disaster Recovery Follow these standards for business continuity and resilience 09 Feb 2021 Disaster Recovery Optimize a BCDR strategy for 2021 and beyond 29 Jan 2021 Data Backup Top 10 tips to effectively manage the data backup process 29 Jan 2021 Security How to create a cloud security policy, step by step 22 Jan 2021 Networking 10 network security tips in response to the SolarWinds hack 20 Jan 2021 1 2 3 4