List Headline Image
Updated by Michael O'Dwyer on Nov 22, 2019
263 items   0 followers   0 votes   1.15k views

My Portfolio

A selection of stories published to date.

Mark Zuckerberg is still pushing for the creation of Libra, but it's obviously futile for him at this point. He knows we don't trust Facebook.

Mission-Critical Applications: Reducing the Cost of Downtime | Pure Storage Blog

In the span of just one minute, the downtime costs from the interruption of mission-critical applications can rise to $10,000. Think then about what an

Storage Considerations for Moving Legacy Applications to the Cloud

Moving legacy applications to the cloud can increase performance and enhance daily operations, but what do you need to know about the transition?

But, where do you start? How do you identify potential security threats?

How much customers care about data breaches is often dependent on the type of customer data obtained by attackers.

I’d like to believe that all readers will use this post to prepare for a ‘what if’ scenario but the sad truth is that some of you are reacting to a data breach and lack an incident response plan.

What are the risks of Shadow IT? How can they be reduced?

Secure Socket Layer (SSL) or Transport Layer Security (TLS) refer to security technologies that encrypt data sent between a web server and web browser.

As IT pros, we’ve been aware for quite some time that some users are a threat to security.

If you are a small or medium business, you may have left your data backups in the hands of outside help or, even worse, to chance.

Two years plus and counting and companies are still being impacted by WannaCry. Here are the four main reasons why an old exploit and ransomware is still an issue.

Why is the GNFA relevant? What are the benefits to companies and to certified GNFA professionals?

Given the number of possible ports, how can network administrators handle a monitoring process or even detect an intrusion?

The Real Reason We Need Multiple Data Backups - WhatsUp Gold

In many jurisdictions, there is a legislative or accounting requirement to store data for a minimum of five years. Easier said than done. That's why multiple data backups are necessary.

How can companies ensure adequate protection of physical and digital files? What are the common attack vectors involved? Does your security policy consider remote and onsite attacks?

Facebook is determined to launch their own digital currency called Libra, but why would anyone trust them at this point?

Azure App Insights will handle public, private and hybrid clouds only. WhatsUp Gold offers an alternative that allows monitoring of the Azure environment and the entire local area network.

It’s fair to observe that Bluetooth has its issues and security vulnerabilities are now being exploited by hackers seeking access to data.

Why Azure is Better Than AWS - WhatsUp Gold

Both Azure and AWS offer a variety of cloud offerings. But why is Azure gaining momentum over AWS?

What is the ideal way to ensure reliable yet prompt update installation? In a traditional office environment, is it practical to supervise individual installs? Can we rely on all updates or will they cause additional problems?

Since encryption is used to secure data, it would seem only natural that encrypting something twice would increase security. That isn't always the case.

Should businesses be worried about Huawei or is this really just hysteria and a political agenda that is sending shockwaves around the world?

Over the past few years, Slack has risen to be the largest collaboration tool to help teams stay on track. In this article, I will discuss how it works.

Is Big Data Losing its Appeal in the Face of Data Privacy Concerns?

The use of big data by enterprises is almost commonplace at this point, with advocates claiming it aids decision-making, increases revenue and productivity and decreases operational costs. But it comes at a cost to data privacy.

Password Management —Secure Passwords Essential for User and Business Protection

For years, security pros have emphasised the need for different passwords, as identical passwords make it way too easy for hackers.

  • Michael O’Dwyer spent more than 15 years in the electronics manufacturing industry, managing information technology, failure analysis, process improvement, after sales and logistics.

    He now writes as a technology and business journalist on topics that interest him, mainly involving areas where technology and business intersect for SMBs and large enterprises. Prior publications include, Dell’s Tech Page One, The Street and HP’s Pulse of IT.

  • Tagged With

  • Tools