Quick cubicle hacks for a healthier, more productive you

They’re not physically demanding, but desk jobs take a toll on your health.

Sitting is the new smoking” is a common refrain of the ergonomic movement. Research shows that sitting all day has adverse health effects. Sitting for extended periods of time or completing repetitive tasks can lead to musculoskeletal disorders (MSDs), which account for approximately 33 percent of all worker injury and illness cases.

Having a more functional and ergonomic workstation isn’t just beneficial for your back, eyes, and circulation; it also improves your overall productivity. No one wants to dive into a challenging project when their eyes are strained and legs are asleep, right? Continue Reading…

Tags: , ,

Not your father’s antivirus: How new malware detection gives IT a leg up in cybersecurity

IT security is a fundamentally uneven playing field: You have to win every day, but attackers have to win just once. Cyber criminals spend mere pennies compared to the huge investments that organizations make on network defenses, specialized security and compliance systems, and employee education. And IT is always chasing a new target – yesterday’s biggest risk was a Trojan horse, today’s threat is ransomware, but tomorrow’s threat is unknown.

Even IT’s best methods – whitelisting, quarantining, and sandboxing – still can’t prevent the majority of attacks, and they often disrupt employee productivity or increase the burden on IT. So is there a way to prevent malware, like ransomware, even if it’s never been seen before? And can you do so without impacting user productivity? The short answer is yes. Here’s how. Continue Reading…

Tags: , , ,

Is your health care organization prepared for a cyber attack?

healthcare-itRansomware and cybercrime hacking have been two of the most common IT security threats in 2016, but many health care organizations aren’t ready to play defense: Only about 60 percent of surveyed organizations had the security capabilities in place to detect and remediate these attacks.

That’s problematic, of course, but is it surprising? After all, many health care organizations place more importance on HIPAA compliance than security, or they aren’t agile enough to protect themselves against the newest threat. Organizations tend to sink their energy into defending against the latest threat of the day, but lag on improving their entire security architecture. Continue Reading…

Tags: , , , , ,

Before buying a UPS, answer these 4 questions

uninterruptible-power-supplyWhen was your last time downtime incident? If you’re like the respondents in a recent IHS survey, you’ve seen five downtime events in the past month.

That adds up to millions of dollars in lost revenue and productivity – midsize companies reported one downtime event cost approximately $1 million — and possible equipment repairs or replacements. Lost or damaged data is an unquantifiable cost.

If you don’t already have a proper battery backup and power protection plan in place, it’s time to do so. An uninterruptible power supply (UPS) system that costs a few hundred dollars will pay for itself many times over if it gets your organization through even a single power failure. Continue Reading…

Tags: , , ,

Why SSDs are taking over in the data center

Intel SSDThe reports of hard disk drives’ (HDDs) death have not been greatly exaggerated. That’s because solid state drives (SSDs) continue their takeover in consumer devices and the data center.

Sure, HDDs and SSDs each have their own advantages, but the latter is the more modern technology that continues advancing. As prices drop, SSDs are proving their advantages to end users and IT managers.

But there’s another huge motivation for large organizations to pick SSDs over HDDs: complex data. I’ll explain. Continue Reading…

Tags: , , ,

Keeping IT equipment safe from power outages

CyberPower on uninterruptible power suppliesSummer is power season, as demand for electric power spikes. Air conditioning and other power demands strain utilities, making brownouts (temporary drops in voltage) and blackouts as common as mosquito bites. Not to mention severe weather events like thunderstorms, tornadoes, and hurricanes that can knock out electricity.

For many, these outages are mere inconveniences. But organizations risk losing sensitive data when a sudden power outage knocks computers and servers offline, especially if the power remains out for hours. A surge protector won’t save you from these outages, no matter the time of year.

The first line of defense against brownouts and blackouts is an uninterruptible power supply (UPS), which provides continuous power during an outage. But different organizations and different hardware will need different power protections. By understanding power requirements and the types of UPS that are available, you can give your organization the protection it deserves. Continue Reading…

Tags: , , ,

Next-gen mobile computing: Thinking beyond BYOD

HP on thinking beyond BYODThink about how new technologies have changed the way we consume music over the past 50 years. From vinyl to cassette tapes, from CDs to MP3s, and now to digital services like Spotify and Pandora, technological advancements can disrupt entire industries and significantly improve user experiences.

Similarly, the way we do business evolves in less than a generation. Not too long ago, IT managers were faced with the concept of BYOD and the increased complexity it carried due to the proliferation of mobile devices entering the business environment.

Today, commercial mobility involves much more. Employees expect a different style of computing to get work done and make their jobs easier. Every organization needs a mobile strategy that’s versatile enough to address the massive shift in where and how we work. To be truly productive, an organization’s strategy must rely on quality and durable devices, broad security controls, and policies that allow IT to easily manage devices.

There are four components of a smart mobile strategy that moves past BYOD. As you evaluate next-gen mobility solutions, keep these four insights in mind: Continue Reading…

Tags: , ,

This is why every organization needs adaptive and autonomous security

McAfee adaptive threat preventionMore than 300 new security threats are detected every minute. Ransomware and malware are growing at double-digit rates, and mobile malware grew 72 percent in the last quarter of 2015. In the face of advanced targeted attacks, full vector protection and a timely response are major challenges for security teams across every sector. Most organizations rely on a multi-vendor, siloed security infrastructure in which products don’t communicate with one another, allowing attacks to penetrate gaps and invade a network.

IT security staff shortages and a lack of automated processes create these inefficiencies and lapses in protection. Plus, existing security infrastructures lack integration of the inspection, intelligence gathering, analytics, and enforcement components of an enterprise security architecture. These essential elements constitute the underpinnings of cybersecurity best practices known as the protect, detect, and correct process of incident response.

What’s the solution? Integration. Instead of buying the entire “best of” list (the best end point protection, best firewall, best IPS), organizations should be adopting security systems that talk to each other, regardless of the vendor. Knowing how that works and why it’s necessary will help you further strengthen your IT security. Continue Reading…

Tags: , ,

What do you do when a virtual machine becomes a noisy neighbor?

Virtualized application performanceThe #1 pain point in the data center is poor performance. That’s what we found from our study of 1,000 data center professionals, who every day watch virtual machines (VM) conflict with databases, slow each other down, and eat up hours spent fine-tuning storage and tackling trouble tickets.

A huge contributor to this performance pain is what’s called “the noisy neighbor problem” — a VM consuming too many resources at the expense of others.

The problem stems from LUNs, the conventional storage groups made up of dozens or even hundreds of VMs. When one of them gets noisy, demanding more than its share of performance reserves, it slows down its neighbors and throws the entire LUN into chaos.

Because they’re built on that LUN architecture, most storage environments running VMs face this challenge. Stopping these rogue VMs is difficult because they’re nearly invisible to scrutiny and correction.

Here’s how you put the issue to rest and guarantee every VM’s performance: isolation. By eliminating the LUN and giving every VM its own neighborhood through VM-aware storage, you can more precisely control the resources apps can demand. Continue Reading…

Tags: , ,

Video and police body cameras: Answers to 6 common questions

NetApp on police body camerasThere are roughly 18,000 police agencies in the United States and they’re all trying to solve the same case: How to deal with the storage requirements of video taken with body cameras.

As adoption of police body cameras rises, small agencies (less than 100 officers) and large metropolitan and state-wide departments (more than 250 sworn officers) all struggle with uploading, categorizing, managing, and storing video evidence. From an on-the-street encounter to a drunk driver arrest, the video evidence taken with these body cameras is generating plenty of data.

This storage conundrum elicits many questions from police agencies nationwide. Here are six common questions we get from police chiefs about video storage and evidence collection, and how to solve the challenges of this new ocean of digital evidence. Continue Reading…

Tags: , , ,