One Year After Hurricane Sandy … Are You Prepared for a Disaster?

Today’s IP news roundup highlights some of the latest headlines in convergence, virtualization and more:

  • One year after Hurricane Sandy, has published a list of things you may be forgetting at your disaster recovery site. The article states, “Most business continuity and disaster recovery plans rely heavily on the services that can be delivered out of a brick and mortar recovery site when a disruption or disaster occurs. But many plans do not explore the availability and recoverability of that site.” One suggestion the article makes is backing up your disaster recovery site in case a long-term outage happens there. This is because many organizations believe that “the disaster recovery site will fill a short-term need handling operations for a few hours while everything is restored at the primary site.” However, the recovery site may need to “assume a major role for days, weeks, or months.” For more information on disaster recovery, see
  • Network security shouldn’t be ‘all or nothing’. An article on The Guardian states that “Most organisations have adopted an ‘all or nothing’ IT security model. Once you’ve proven who you are (typically by using a password), you get to access all the information you are authorised to see.” This means that a hacker only needs to crack one password to gain access to your entire system. The article suggests that you add context to your security, or “the use of situational information (such as identity, location, time of day, reputation and so on) to improve information security decisions.” This means your security will be able to tell that you are you – not just by entering the right password, but by how you are behaving. For more information on context aware security, see The Guardian.
  • Virtualization can make your cloud services more secure. According to the Data Center Knowledge blog, organizations have been using virtualization to become more agile and scalable. However, they must also consider how virtualization impacts cloud security. The article states, “By controlling data, applications, and even desktops at the data center, administrators can deliver a secure look and feel to the end-user. By incorporating flexible virtualization-ready solution[s] – data center administrators suddenly have a lot more tools at their disposal.” The article goes on to provide tips on how to secure your network when using cloud services and virtualization. For more information, see the Data Center Knowledge blog.
  • And finally … wearable technology is coming to the enterprise. A panel at CTIA’s MobileCon 2013 demonstrated how wearable technology – such as smartwatches and smartglasses – can provide enterprises with a number of augmented reality (AR) benefits. For example, developers of the Epson Moverio BT-100 glasses “have created enterprise applications designed to help service techs repair complicated machinery using AR tech, assist factory workers fill complex orders and follow detailed instructions while freeing up their hands, and help people monitor or access hard-to-reach places using remote-controlled drones”. For more highlights from the wearable tech panel, see

What is your take on today’s news? Please share your opinions below.

Share this article:
Comments are closed.