The insurance industry has always been a hotspot for IT security threats since the information that can be used for insurance fraud is a hot commodity amongst hackers. Health insurance fraud alone accounts for a hefty $80 billion bill each year as estimated by the Federal Bureau of Investigations (FBI). In fact, who could forget
Thanks to all that attended “Enabling Digital Access for Patients and Providers – Securely & Simply”
We had the pleasure of sitting down for an in-depth executive roundtable this morning with over a dozen leading healthcare information and security executives. While the topics were wide-ranging, the consensus was that identity security is critical, particularly in the face of increased digital engagement with patients and between healthcare staff. We look forward to
It’s not just malicious cyber-attacks or criminal activity that companies need to prepare for. The majority of data breaches originate within companies due to human error or negligence, and in many cases, this can be traced back to the lack of proper access controls. One of the biggest access challenges? Securely and efficiently managing non-employee
It’s a basic question that I get at least weekly. When estimating cabinets (and PDU), there are physical considerations (space, weight, and design features) and power/cooling considerations. RU Space This is a physical space limitation. Rack Units (RU or just U) are 1.75” measures usually having 3 holes each for mounting equipment. For example, a
When the energy and utility industry is the target of a cyber-attack the stakes are higher than in other industries because a cyber-attack has the ability to actually endanger the public. Recently, an amateur hacker took over the tornado warning system for the city of Dallas, Texas, and set off 156 sirens just before midnight.
Because Data Center Infrastructure Management (DCIM) touches all functional areas of the data center and affects all data center groups and silos, finding the “right” DCIM solution can be a daunting task, especially for companies with medium to large data centers. This means that someone within your organization, or a trusted advisor from the outside,
You can build application mapping by a series of smaller tasks. Begin by determining the breadth of scope. Next, identify the applications. Then, gather the facts. And last, follow-up on the loose ends. This blog does not cover why one would do Application Mapping or, as DCMWORKS calls it, Application Finger Printing (AFP). That was
There is no single migration plan that all business entities should follow when migrating data centers. A simple migration plan can be a disaster when there are critical systems and a deep dive discovery process can be a waste of resources when there is no need. In any event, it is worth getting someone who specializes
In migration projects, it is important that there be cohesive management to avoid migration schedule slips and keep your data center migration on track. That means managers makes silos work together instead of sequentially. If you will, it is the difference between a Confederation and a Union. In normal operations, items in the data center
A recent client engagement proved the opportune time to perform an assessment of their VMWare environment. Over 90% of servers and 50% of user workstations were guest Operating Systems (OSes) running on top of the VMWare hypervisors. There were occasional reports of slowness but nothing was reported consistently. The purpose of the assessment was to