Paul Kirvan Independent IT consultant/auditor Search Storage A comparison of distributed file systems 09 Nov 2022 Search Security Types of vulnerability scanning and when to use each 08 Nov 2022 Search Security How to build a shadow IT policy to reduce risks, with template 08 Nov 2022 Search Disaster Recovery Where do business continuity plans fit in a ransomware attack? 01 Nov 2022 Search Data Backup The ins and outs of unstructured data protection 31 Oct 2022 Search Disaster Recovery Create a flood business continuity plan to stay afloat 27 Oct 2022 Search Data Backup 5 unstructured data backup challenges and how to handle them 26 Oct 2022 Search Storage cloud NAS (cloud network attached storage) 24 Oct 2022 WhatIs polarity 18 Oct 2022 Search Security An overview of the CISA Zero Trust Maturity Model 12 Oct 2022 Search Security How to conduct a cybersecurity audit based on zero trust 11 Oct 2022 Search Networking What to include in a network disaster recovery plan checklist 04 Oct 2022 WhatIs adiabatic cooling 03 Oct 2022 WhatIs logical implication 30 Sep 2022 WhatIs table 30 Sep 2022 WhatIs synchronous/asynchronous API 29 Sep 2022 WhatIs memory management unit (MMU) 29 Sep 2022 WhatIs hue, saturation and brightness 27 Sep 2022 Search Security 10 PCI DSS best practices to weigh as new standard rolls out 27 Sep 2022 Search Disaster Recovery Use ISO 22320:2018 to prepare an incident management plan 23 Sep 2022 WhatIs watt-hour (Wh) 22 Sep 2022 WhatIs cluster 19 Sep 2022 Search Networking Tips to prepare for a network disaster recovery audit 13 Sep 2022 WhatIs CAVE (Cave Automatic Virtual Environment) 13 Sep 2022 WhatIs scale-out storage 12 Sep 2022 Search Storage Tips to achieve compliance with GDPR in cloud storage 08 Sep 2022 WhatIs customer demographics 01 Sep 2022 WhatIs plotter 01 Sep 2022 Search Disaster Recovery Use ISO/TS 22317:2021 to shape your business impact analysis 31 Aug 2022 WhatIs apparent power 31 Aug 2022 Search Storage NAS vs. server: Which storage option should you choose? 29 Aug 2022 Search Security PCI DSS v4.0 is coming, here's how to prepare to comply 24 Aug 2022 WhatIs critical path method (CPM) 23 Aug 2022 Search Security 8 secure file transfer services for the enterprise 19 Aug 2022 WhatIs GPS coordinates 18 Aug 2022 Search Disaster Recovery Free disaster recovery budget template to justify BCDR spending 15 Aug 2022 Search Storage Differences in scale-up vs. scale-out storage 02 Aug 2022 Search Disaster Recovery Use recovery level objective to fine-tune BCDR response 29 Jul 2022 Search Security data compliance 20 Jul 2022 WhatIs six degrees of separation 18 Jul 2022 Search Storage Key differences in software RAID vs. hardware RAID 13 Jul 2022 WhatIs analog-to-digital conversion (ADC) 13 Jul 2022 Search Networking BGP vs. EIGRP: What's the difference? 08 Jul 2022 Search Security How to create a critical infrastructure incident response plan 07 Jul 2022 Search Storage Key features of a distributed file system 22 Jun 2022 WhatIs computer instruction 15 Jun 2022 WhatIs laser printer 13 Jun 2022 WhatIs memorandum of understanding (MOU) 02 Jun 2022 WhatIs contingency plan 31 May 2022 WhatIs multithreading 26 May 2022 Search Disaster Recovery Free business impact analysis (BIA) template with instructions 26 May 2022 Search Disaster Recovery Business resilience vs. business continuity: Key differences 26 May 2022 Search Disaster Recovery ITGC audit checklist: 6 controls you need to address 24 May 2022 Search CIO business resilience 23 May 2022 WhatIs instruction set 23 May 2022 Search Disaster Recovery A free business continuity plan template and guide 16 May 2022 WhatIs troubleshooting 13 May 2022 Search Disaster Recovery Top 10 business continuity risks to monitor 10 May 2022 Search Storage What are some tips for storage of sensitive data? 09 May 2022 Search Security The top secure software development frameworks 09 May 2022 Search Storage How can organizations prepare for a data storage audit? 21 Apr 2022 Search Security Pen testing guide: Types, steps, methodologies and frameworks 07 Apr 2022 Search Security Open System Authentication (OSA) 07 Apr 2022 Search Data Center data center resiliency 04 Apr 2022 Search Disaster Recovery How AI adds value to crisis communications systems 29 Mar 2022 Search Disaster Recovery How to calculate maximum allowable downtime 28 Mar 2022 Search Security How to overcome GDPR compliance challenges 24 Mar 2022 Search Networking application layer 22 Mar 2022 Search Security mutual authentication 21 Mar 2022 Search Security How to write an information security policy, plus templates 11 Mar 2022 Search Storage What to look for in a green cloud storage provider 10 Mar 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Maintenance and continuous improvement 09 Mar 2022 Search Data Center hot/cold aisle 28 Feb 2022 Search Networking Network Time Protocol (NTP) 28 Feb 2022 Search Data Center computer room air handler (CRAH) 17 Feb 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Staff training, incident and media management 08 Feb 2022 Search Data Center utility computing 04 Feb 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Setting strategy and developing plans 27 Jan 2022 Search Security Top cloud security standards and frameworks to consider 21 Jan 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Assessing risk and business impact 19 Jan 2022 Search Disaster Recovery What is the role of qualitative and quantitative impact in DR? 16 Nov 2021 Search Storage How to effectively plan cloud storage scalability 15 Nov 2021 Search Mobile Computing satellite 15 Nov 2021 Search Networking How zero-trust SDP can work with a VPN for remote work 15 Nov 2021 Search Disaster Recovery Prepare a supply chain disaster recovery plan 10 Nov 2021 Search Security Steps for building a privacy program, plus checklist 05 Nov 2021 Search Unified Communications VoIP caller ID (voice over Internet Protocol caller identification) 05 Nov 2021 Search Data Center single point of failure (SPOF) 04 Nov 2021 Search Networking What are the 6 components of structured cabling? 04 Nov 2021 Search Security Report on Compliance (ROC) 03 Nov 2021 Search Disaster Recovery How to calculate and reduce MTTR 01 Nov 2021 Search Storage Perform data storage testing to prevent issues 29 Oct 2021 Search Storage tape drive 28 Oct 2021 Search Security Securities and Exchange Commission (SEC) 27 Oct 2021 Search Storage storage capacity planning 18 Oct 2021 Search CIO How to evaluate and select GRC vendors and tools 12 Oct 2021 Search Data Backup Backup scheduling best practices to ensure availability 07 Oct 2021 Search Disaster Recovery Prepare and conduct a ransomware tabletop exercise 04 Oct 2021 Search Networking Remote access vs. site-to-site VPN: What's the difference? 04 Oct 2021 Search Storage Implement data storage policy with guidelines, free template 30 Sep 2021 1 2 3 4 5 6