data protection


The Datotel Risk Assessment Methodology

Risk assessments come in many forms, but the underlying purpose is to identify and document known risks to a given process or system and identify the consequences if that risk were to occur. With the risks both identified and quantified, … Continue reading

Posted in Company Info, Risk, Security | Tagged , , , | Leave a comment

Keeping up with HIPAA

The fact is, as technology continues to grow and change rapidly, so do rules and regulations that are intended to save us from ourselves. We’ve heard about the Health Insurance Portability & Accountability Act (HIPAA), the government act put in … Continue reading

Posted in Backup, BYOD, Cloud Computing, Datavaulting, HIPAA, Mobile, Security | Tagged , , , , , , , | Leave a comment

The Reality of BYOD Security

It doesn’t matter if you’re the CEO, CFO, CIO or the CBP (Chief Button Pusher), every one in any business is capable of unintentionally compromising security. Every business now deals with Bring Your Own Device (BYOD) issues at some level … Continue reading

Posted in BYOD, Mobile, Security | Tagged , , , , , , | Leave a comment

When Was The Last Time You Did a Restore?

-Thanks to our partners at Asigra for featuring this article in their November 2011 corporate newsletter – Working in the backup, recovery and restore industry, I’ve come to the sad realization that many organizations, both big or small, feel adequately … Continue reading

Posted in Asigra, Datavaulting, Security | Tagged , , , , , , | Leave a comment
  • The Datotel Risk Assessment Methodology:

    Risk assessments come in many forms, but the underlying purpose is to identify and document known risks to a given process or system and identify the consequences if that risk were to occur. With the risks both identified and quantified, … Continue reading

    ...more
  • Admin Terms of Use Contact Us