HIPAA, otherwise known as the Health Insurance Portability and Accountability act, which was first introduced in 1996, demanded that the department for human services and health in the U.S. (HHS) should create specific regulations to protect the security and privacy…
According to the Verizon State of The Market: Enterprise Cloud 2014 Report, the cloud rush is on. Already, more than 65% of enterprises have adopted it, and many more are considering it as a vital resource for business growth. With…
Would it surprise you to know that 93 percent of all documents in the world are created electronically, of which 70 percent never even go through a hard copy conversion? this fun fact is not from some 2015 survey, but…
The Federal government requires organizations to identify PII (Personally Identifiable Information) and PHI (Protected Health Information) and handle them securely. Any unauthorized release of this data could result in severe repercussions for the individual whose information has been compromised, as…
Multiple investigations are currently in progress to analyze the data breach at Anthem insurance, in which over 80 million records were stolen including SSN, credit card and medical history. The incident shows how hackers are increasingly targeting health care industry, mainly for its rich…
Some of the biggest and the most prominent fire-drills that arise for system admins are the issues associated with troubleshooting system. Without the right tools, it can be practically impossible to track down the origin of faults, fix the problem…
Apart from businesses and corporations, government agencies are other major consumers of storage solutions nationwide. Before the Federal Data Center Consolidation Initiative, government agencies largely relied on in-house storage systems that compromised of thousands of data storage drives in unconsolidated…
When it comes to security breaches, 2014 was an unprecedented year. Attacks were launched against some of the biggest corporations and most famous celebrities in the world. The tip of the cyberwar was reached with the controversy that the James…
Just about every organization or business that exists today has an ingrained fear when it comes to protecting information. No-one wants to lose their confidential, critical or highly restricted data, and the fear of losing this data becomes even…
Virtualization as a technology has significantly grown since the 1960s, when IBM came up with the IBM System/360 Model 67, which is largely considered to be the first ever virtual machine. After reportedly surpassing 50% of all server workloads,…