combatting-cyber-attacks-with-robust-disaster-recovery-and-data-protection
Axcient Launches New Fusion ACE Certification Training

We are excited to announce that, to complement our release of Axcient Fusion, we have released a new Axcient Certified Expert (ACE) curriculum to help teach users how to protect their businesses in the cloud with Fusion. The Fusion ACE training offers a detailed walkthrough of the Fusion service and is available in the Axcient Portal. The… Read more »

10 Tips for Surviving an IT Outage with IT Resilience

Growing business demands and shrinking budgets continually burden IT professionals. The ramification is increased pressure on the ability to respond to a crisis — from breaches and ransomware attacks to natural disasters and data loss due to user error. This equates to much-too-long downtime that can cost a business dearly; in many cases, to the… Read more »

tscallan
Will “ransomware-as-a-service” platforms put more businesses at risk in 2017?

Ransomware is a problem that doesn’t seem to be going away any time soon – and it looks as though cyber attackers’ newest platform for digital crime, “ransomware-as-a-service”, might make the problem even worse. In 2016 alone, tens of thousands of people were hit with some form of ransomware or malware attack – from large… Read more »

6 Tips to Make Your IT Resilient

Most businesses are critically reliant upon their IT systems. If these systems go down due to a natural disaster, temporary power outage, loss of data center, ransomware or hacker attack, lost or corrupted files, or an application failure due to a software virus, the results can inflict significant financial harm. In the worst case, the business will… Read more »

tscallan
Combatting Cyber Attacks with Robust Disaster Recovery

Cyber attacks are on the rise… It’s not a matter of if but when. This past year, we’ve seen a range of cyber attacks affecting everything from Yahoo! to the MUNI in San Francisco to the Presidential election. Systems and organizations that we thought were foolproof fell victim to malware and security breaches. Organizations shelled… Read more »

Validating Axcient Fusion with ESG

I’ve been at Axcient for quite some time. Over four years in fact, and one of the things that really convinced me to join Axcient was our engineering department. It is so satisfying having a development team that is able to see a pain point in the industry. Then is able to architect a solution… Read more »

Why don’t all businesses have a good continuity strategy?

It has been said that an ounce of prevention is worth a pound of cure. In the case of disaster recovery, however, businesses tend focus on prevention without anticipating the need for a cure. It may be painful to admit, but disaster in some form is nearly unavoidable, whether due to severe weather, an accident… Read more »

tscallan
AI, Autonomous Cars and Moral Dilemmas

You’re a train conductor speeding along when you suddenly see five people tied up on the tracks in front of you. You don’t have enough time to stop, but you do have enough time to switch to an alternate track. That’s when you see there’s one person tied up on the alternate track. Do you… Read more »

Justin Moore
False Sense of IT Security

Traditional security tactics teach us to build our infrastructure like a castle —strong, high, impenetrable walls with a few points of securable entry, surrounded by a moat and on top of a hill. With elementary mechanisms in place — like antivirus software and a firewall — many businesses think they are well protected. Unfortunately, organizations are leaving themselves exposed to… Read more »

tscallan