SALES & SUPPORT 844.600.0075

Access Reviews: Protecting Against needless Internal Security Vulnerabilities

Our Compliance Consultant, Joe Dylewski of ATMP Solutions, was telling us recently about an often unrecognized or forgotten internal security vulnerability that occurs at many companies. When employees change positions or leave the company entirely, the access they require to systems and applications also changes. But, too often, and especially when an employee changes positions within a company, previous access rights are not changed. Each failure to keep access privileges current introduces a risk.

Read More

How Virtual Desktops Ensure Continuous Operations

Part of the Executive Blog Series About this Series The Information Technology field is evolving at an exponential pace. The number of available paths to navigate this field seems limitless; and it is easy for a business to unintentionally follow one that does not lead to their desired outcome. All too often, businesses rely solely on technologists within the company to steer the company’s IT strategy and convey the benefits to the business decision makers. Although this can be effective in some cases, it frequently leads to the chosen IT solution falling short of desired business outcomes. This blog series aims to mitigate that risk by evaluating some of the complex technological trends and translating them to real-world business impacts that can be easily understood by any business leader. Here is an important question to ponder: what would the impact be to your business if your critical IT systems went down for two days? What about a week? A month? One of the top 5 commonalities among Customers that I speak with is that executive management/ownership is on a different page than the IT team regarding up-time of critical IT systems. 

Read More

Protecting Your Data - All You Never Wanted to Know about FIPS 140-2

Warning! This blog starts out with some techy jargon but it’s well worth your time if you have data that needs to be secured. I promise this blog has a business focus. “Security requirements for cryptographic modules.” That’s the official title of the Federal Information Processing Standards Publication 140-2, otherwise known as FIPS 140-2. This US Government standard specifies the security requirements that will be satisfied by a cryptographic module utilized within a security system protecting sensitive but unclassified information. It was written for the government and any organization doing business with the government, and businesses have adopted it as a computing standard regardless of government interaction. Wait! Don’t stop reading.

Read More

What is the right Data Backup Solution for Your Business?

On the surface, we all acknowledge that we should be backing up our organization’s data. However, there are a surprising number of businesses that are not doing this; not regularly, not securely, or not at all. We encounter companies all the time – and these aren’t small companies, either – who are backing up data to an external drive and taking it home with them, or worse yet, not backing up data at all. Pretty shocking, isn’t it. Is that your organization? Are you wondering how to get started and what options you have?

Read More

6 Tips for Keeping Your Organization Safe with Portable Media

We've all used USB Thumb Drives / Memory Sticks. In fact, you probably have a few in your desk drawer or computer bag. And, if you're like most people, you haven't realized how risky the use of these devices is for your data and your organization. We asked Joe Dylewski of ATMP Solutions, a Michigan-based firm specializing in compliance for HIPAA, ISO 27001, NIST and other technology and data related regulations, about the risks associated with the use of portable media. Here's what he had to say:

Read More

Evaluation Tips for Disaster Recovery as a Service

Ask yourself these questions – If your data center crashed at this moment (for any reason)… How would your company recover? Who would you call to recover your data and resume operations? How would you keep the doors open? How much data would you lose? Be honest with your answers – your business depends on it. If your answer is “I don’t know”, it’s time to worry because you haven’t assessed the potential damage nor ways to mitigate them. It’s worse to have NOT assessed your disaster recovery risk than to have assessed it and found your plans to be lacking. In the latter scenario, at least you have some level of awareness and a minimum understanding of your risks.

Read More

The Importance of Security Awareness Training

Is it surprising to know that over 90% of all information security incidents are the result of human error? Whether the root cause of incidents and breaches is ransomware, lost or stolen workstations, inadvertently sending sensitive information via email, or phishing, the more all of us can be informed of the potential vulnerabilities, the more we can do to eliminate these occurrences. Your organization should routinely offer training in the form of classroom presentations, webinars, or security briefings. The importance of this training cannot be understated.

Read More

DR Change Management in an Outsourced Environment

Effective change management is required to ensure the integrity of the IT operational environments and an outsourced DR environment.  The most basic premise of DR testing and recovery is that the combination of application/infrastructure systems protected in a DR environment can be restored to the customer’s operational environment and IT WORKS!

Read More

How to Protect Against Meltdown and Spectre Vulnerabilities

As many of you have read or heard in the news recently, the Meltdown and Spectre vulnerabilities are a large concern for many organizations and Technology Managers. The issue is not specific to any one vendor and takes advantage of techniques commonly used in most of the modern processor architectures. This means that a large range of products are affected, from desktops and laptops to servers and storage, even smartphones. You should note, and as Intel reports in their FAQ, researchers have only demonstrated a proof of concept.  Here are some suggestions that you and/or your organization can take to help mitigate the risks from the Meltdown and Spectre Vulnerabilities:

Read More

CloudSAFE leverages ZERODOWN™ Software to provide Cloud Migration Services to AWS, Azure and CloudSAFE Hosted Private Cloud

PRWEB July 14, 2017: Migrating to the public cloud can be a significant challenge for organizations with existing infrastructure. Moving data and applications from legacy systems can take months and cause slowdown and service interruption. CloudSAFE has teamed up with ZeroNines to offer organizations a secure, uninterrupted migration to the cloud. Leveraging the power of ZERODOWN™ Software Always Available™ technology, organizations can realize their cloud strategies with no interruption to applications. No longer is cloud adoption and infrastructure migration a long and cumbersome process.

Read More

About this Blog


How can you leverage The Cloud? How will you get there? What will protect you from disaster? Your cloud journey can start anywhere and evolve. CloudSAFE can help you no matter where you start or where you want to go.

Everyone says you need to be in The Cloud. But why? And how? CloudSAFE can help you determine what that means to your company and the best way to get there. The Cloud can be a powerful tool. It provides flexibility, security, capacity and it’s cost effective, enabling you to avoid capital investment. But the question remains, what is right for your company? Contrary to popular opinion, The Cloud is not one size fits all. CloudSAFE has a broad range of solutions and services focused on IT Business Continuity and Infrastructure as a Service.

CloudSAFE believes The Cloud is not “One Size Fits All”. Follow us on our blog and see what else we believe in, and be sure to share your feedback with us.

Subscribe to Email Updates

Recent Posts