Paul Kirvan Independent IT consultant/auditor Search Disaster Recovery Free disaster recovery budget template to justify BCDR spending 15 Aug 2022 Search Storage Differences in scale-up vs. scale-out storage 02 Aug 2022 Search Disaster Recovery Use recovery level objective to fine-tune BCDR response 29 Jul 2022 Search Security How to create a data security policy, with template 21 Jul 2022 Search Security data compliance 20 Jul 2022 WhatIs six degrees of separation 18 Jul 2022 Search Storage Key differences in software RAID vs. hardware RAID 13 Jul 2022 WhatIs analog-to-digital conversion (ADC) 13 Jul 2022 Search Networking BGP vs. EIGRP: What's the difference? 08 Jul 2022 Search Security How to create a critical infrastructure incident response plan 07 Jul 2022 Search Storage Key features of a distributed file system 22 Jun 2022 WhatIs computer instruction 15 Jun 2022 WhatIs laser printer 13 Jun 2022 WhatIs motherboard 06 Jun 2022 WhatIs memorandum of understanding (MOU) 02 Jun 2022 WhatIs contingency plan 31 May 2022 WhatIs multithreading 26 May 2022 Search Disaster Recovery Business resilience vs. business continuity: Key differences 26 May 2022 Search Disaster Recovery Free business impact analysis (BIA) template with instructions 26 May 2022 Search Disaster Recovery ITGC audit checklist: 6 controls you need to address 24 May 2022 Search CIO business resilience 23 May 2022 WhatIs instruction set 23 May 2022 Search Disaster Recovery A free business continuity plan template and guide 16 May 2022 WhatIs troubleshooting 13 May 2022 Search Disaster Recovery Top 10 business continuity risks to monitor 10 May 2022 Search Data Center green data center 10 May 2022 Search Storage What are some tips for storage of sensitive data? 09 May 2022 Search Security The top secure software development frameworks 09 May 2022 Search Data Center How much energy do data centers consume? 25 Apr 2022 Search Storage How can organizations prepare for a data storage audit? 21 Apr 2022 Search Security Pen testing guide: Types, steps, methodologies and frameworks 07 Apr 2022 Search Security Open System Authentication (OSA) 07 Apr 2022 Search Data Center data center resiliency 04 Apr 2022 Search Disaster Recovery How AI adds value to crisis communications systems 29 Mar 2022 Search Disaster Recovery How to calculate maximum allowable downtime 28 Mar 2022 Search Security How to overcome GDPR compliance challenges 24 Mar 2022 Search Networking application layer 22 Mar 2022 Search Security mutual authentication 21 Mar 2022 Search Security How to write an information security policy, plus templates 11 Mar 2022 Search Storage What to look for in a green cloud storage provider 10 Mar 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Maintenance and continuous improvement 09 Mar 2022 Search Data Center hot/cold aisle 28 Feb 2022 Search Networking Network Time Protocol (NTP) 28 Feb 2022 Search Data Center computer room air handler (CRAH) 17 Feb 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Staff training, incident and media management 08 Feb 2022 Search Data Center utility computing 04 Feb 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Setting strategy and developing plans 27 Jan 2022 Search Security Top cloud security standards and frameworks to consider 21 Jan 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Assessing risk and business impact 19 Jan 2022 Search Disaster Recovery What is the role of qualitative and quantitative impact in DR? 16 Nov 2021 Search Storage How to effectively plan cloud storage scalability 15 Nov 2021 Mobile Computing satellite 15 Nov 2021 Search Networking How zero-trust SDP can work with a VPN for remote work 15 Nov 2021 Search Disaster Recovery Prepare a supply chain disaster recovery plan 10 Nov 2021 Search Security Steps for building a privacy program, plus checklist 05 Nov 2021 Search Unified Communications VoIP caller ID (voice over Internet Protocol caller identification) 05 Nov 2021 Search Data Center single point of failure (SPOF) 04 Nov 2021 Search Networking What are the 6 components of structured cabling? 04 Nov 2021 Search Security Report on Compliance (ROC) 03 Nov 2021 Search Disaster Recovery How to calculate and reduce MTTR 01 Nov 2021 Search Storage Perform data storage testing to prevent issues 29 Oct 2021 Search Storage tape drive 28 Oct 2021 Search Storage Understand your storage infrastructure management 28 Oct 2021 Search Security Securities and Exchange Commission (SEC) 27 Oct 2021 Search Storage storage capacity planning 18 Oct 2021 Search CIO How to evaluate and select GRC vendors and tools 12 Oct 2021 Search Data Backup Backup scheduling best practices to ensure availability 07 Oct 2021 Search Disaster Recovery Prepare and conduct a ransomware tabletop exercise 04 Oct 2021 Search Networking Remote access vs. site-to-site VPN: What's the difference? 04 Oct 2021 Search Disaster Recovery IT risk assessment template (with free download) 01 Oct 2021 Search Storage Implement data storage policy with guidelines, free template 30 Sep 2021 Search Security 17 ransomware removal tools to protect enterprise networks 10 Sep 2021 Search Disaster Recovery Top mass notification system vendors and how to choose one 31 Aug 2021 Search Disaster Recovery Use ISO 22332 to improve business continuity plans 30 Aug 2021 Search Storage Adopt data storage security standards to ensure compliance 25 Aug 2021 Search Disaster Recovery Fortify emergency communications systems with a business plan 19 Aug 2021 Search Disaster Recovery Make a power outage business continuity plan with these tips 18 Aug 2021 Search Disaster Recovery Build a BCDR employee training program for peak resilience 29 Jun 2021 Search Security Mitigate threats with a remote workforce risk assessment 29 Jun 2021 Search Disaster Recovery Organizational resilience questionnaire for recovery teams 28 Jun 2021 Search Disaster Recovery 12 skills business continuity managers need to succeed 24 Jun 2021 Search Networking How to use two VPN connections at the same time 22 Jun 2021 Search Networking 10 Gigabit Ethernet (10 GbE) 10 Jun 2021 Search CIO An adequacy audit checklist to assess project performance 24 May 2021 Search Security Create a remote access security policy with this template 20 May 2021 Search Disaster Recovery The tiers of disaster recovery, explained 14 May 2021 Search Disaster Recovery How do risk assessment costs vary and why? 13 May 2021 Search Security How to successfully automate GRC systems in 7 steps 07 May 2021 Search Security 12 Microsoft Exchange Server security best practices 09 Apr 2021 Search Security Exploring GRC automation benefits and challenges 09 Apr 2021 Search Networking Best practices for VPN traffic monitoring 02 Apr 2021 Search Storage How to develop and implement a data storage plan 31 Mar 2021 Search Disaster Recovery Create an incident response plan with this free template 30 Mar 2021 Search Disaster Recovery Prepare for the unknown with an organizational resilience model 29 Mar 2021 Search Disaster Recovery How to establish an operational resilience training program 23 Mar 2021 Search Data Backup Which backup standards guide a data protection strategy? 18 Mar 2021 Search Disaster Recovery Operational resilience frameworks hinge on breaking down silos 12 Mar 2021 Search CIO 14 need-to-know tips for digital transformation success 09 Mar 2021 Search CIO 10 ways the pandemic changed digital transformation 09 Mar 2021 Search Data Backup Top 3 backup and recovery requirements for data protection 26 Feb 2021 1 2 3 4 5 6