Home

From Wikibon

(Difference between revisions)
Jump to: navigation, search
Line 2: Line 2:
{|
{|
|+
|+
-
| colspan="2" | <tipoftheday />
+
| colspan="2" | <tipoftheday category="wikitips" />
|+
|+
| width="50%" valign="top" |  
| width="50%" valign="top" |  
Line 27: Line 27:
-
[[Category:Business compliance]]<br />[[Category: Clustered storage]]<br />[[Category: Email archiving]]<br />[[Category: Email storage]]<br />[[Category: Green storage]]<br />[[Category: Storage disaster recovery]]<br />[[Category: Storage services]]<br />[[Category: Storage vendor management]]<br />[[Category: WEB2.0]]<br />[[Category: Wikitips]]<br />
+
[[Category:Business compliance]]<br />[[Category: Clustered storage]]<br />[[Category: Email archiving]]<br />[[Category: Email storage]]<br />[[Category: Green storage]]<br />[[Category: Storage disaster recovery]]<br />[[Category: Storage services]]<br />[[Category: Storage vendor management]]<br />[[Category: WEB2.0]]<br />

Revision as of 02:52, 18 November 2008

Wikitip

Why use IT security?

IT security is an important aspect to companies when it comes down to their network security. Every company should have IT security in place to protect their software, hardware and organisation.

IT security protects data on computers and protects personal data and financial data by preventing possible dangers from external attacks. There are many types of IT security with many products to help protect networks and file encryption software to stop emails from being hacked into.

Forms of IT security include network security, which protects the network from potential risks, endpoint security, which protects the user from sharing information that they should be keeping confidential.

Mobile device management is a form of IT security, which controls any security risks that may occur with any mobile workforce to enhance your business flexibility. Data security is protecting your data as it enters and leaves your network.

Finally cyber security is highly important, as there are constantly threats and new ways for attackers to get into networks, if someone was successful in hacking into your network it could cause serious issues. Therefore, protecting your network from these hackers via IT security is a definite.

If your confidential data was hacked into and loss it could mean cash flow, reputation and competitiveness are jeopardized, which is not a position any business wants to be in.


View Another Wikitip

Featured Case Study

Virtualization Energizes Cal State University

John Charles is the CIO of California State University, East Bay (CSUEB) and Rich Avila is Director, Server & Network Operations. In late 2007 they were both looking down the barrel of a gun. The total amount of power being used in the data center was 67KVA. The maximum power from the current plant was 75kVA. PG&E had informed them that no more power could be delivered. They would be out of power in less than six months. A new data center was planned, but would not be available for two years.

read more...

Storage Professional Alerts


Featured How-To Note

Storage Virtualization Design and Deployment

A main impediment to storage virtualization is the lack of multiple storage vendor (heterogeneous) support within available virtualization technologies. This inhibits deployment across a data center. The only practical approach is either to implement a single vendor solution across the whole of the data center (practical only for small and some medium size data centers) or to implement virtualization in one or more of the largest storage pools within a data center.

read more...










Personal tools