Should you Virtualize Everything?

Okay, maybe not everything. I would offer that there are only a few reasons left for some servers to remain as physical devices:

You want to virtualize more, but you can’t afford more hosts/infrastructure yet.
Some of your servers are turnkey appliances.
Some of your servers have support contracts that require physical platforms or some other requirement from the original deployment.
Some of your administrators believe that virtualization is a fad that will pass soon.
Some of your administrators do not believe that the I/O performance difference between VMs and physical servers is negligible.
Some of your applications require access to hardware that can’t be done in a VM, such as a licensing USB stick, a connection to a tape drive, or other peripheral media…


Shadow IT and the CIO Dilemma

Shadow IT is nothing new. It’s a threat long wreaking havoc on CIOs and IT administrators.

But only recently have we begun to realize the magnitude of the issue.

For years, we’ve known that employees and lines of business are bypassing IT departments to
get the cloud services they want to get their jobs done—whether it’s the streaming music service
that curates the ultimate focus playlist, or the cloud storage apps that keep documents in a row.
More recently, the acknowledgement of rogue IT has been quickly followed by a conversation
around the unintended and potentially dangerous consequences: increased security risks,
compliance concerns and hidden costs.

To shed new light on the issue, Cisco mined data from Cloud Consumption Service
engagements with hundreds of large enterprise customers across United States, Europe,
Canada and Australia. The data came from actual customer use discovered over the network,
not surveys. The findings were eye opening, to say the least…


How to Spot Phishing Attacks

Phishing Attack means that hackers lead the victims to reveal their personal information by Email or fake website and use for fraud. To protect yourself from phishing attacks, you should: Don’t trust the emails asking you to do something strange Check URL of the links which ask you to fill out banking information Use Anti-Phishing tools…


China Cracks Down on VPN Use

Since the end of 2014, the China Firewall as begun actively blocking all VPN traffic. VPN connections becoming slow & unstable Many VPN Proxy service providers are shutting down as a result of the crackdown The disruption has mainly affected corporate connections such as universities while home connections that use standard broadband systems have been unaffected.…


Dell Pre-Installed Software Vulnerability

VULNERABILITY WITH PRE-INSTALLED DELL PC SOFTWARE   Recently, a security vulnerability has been identified in the pre-installed software that comes with all new Dell PCs. Older versions of  the Dell System Detect software have an exploitable weakness that can allow hackers to gain control of a PC when accessing fake versions of the Dell website.  Weakness…