Data Security

PCI: Addressing the Security Risks of Virtual and Cloud Computing

The PCI Security Standards Council today released new guidance to help merchants understand and mitigate the security risks of virtual environments. While virtualization offers great benefits such as cost reduction and infrastructure efficiency, it also comes with new risks. As more businesses adopt virtualization, it is essential to ensure those systems and services comply with…

Learn More

Wall Street Journal Touts the Importance of CIOs

An article in today’s Wall Street Journal by writer John Bussey says it’s time for CIOs to start reporting to the top: “Even though data security is a 21st century priority, at many companies, the organization chart is still firmly back in the 20th century.” In the wake of the Sony Playstation hacker attack, companies…

Learn More

Protecting Businesses from the Fate of Sony PlayStation

Sony was hacked and is now facing billions of dollars in lawsuits in the wake of security breaches of its PlayStation network — a breach that exposed tens of millions of its customers’ account data, including credit card information. There are strict regulations covering the storage and care of customers’ financial data, but the incidents…

Learn More

Disaster Preparedness: Is Your IT Department Ready?

The recent cataclysmic events that have struck Japan in the wake of the massive earthquake and subsequent nuclear disaster should serve as a serious wake-up call about the need for an effective disaster recovery and business continuity plan. Hurricanes, tornadoes, floods, blizzards, and fires are all conspiring against your business. Is your business prepared to…

Learn More

Planning to Fail: Six Tips for Smart Contingency Planning

Positive thinking will only get you so far and will be of little help should your network goes down. Think of a business continuity plan as an insurance plan for your technology infrastructure and your valuable data. Consider the repercussions to your business if you lost data or your technology infrastructure failed. How do you…

Learn More

Lower Your IT Costs with Microsoft Exchange Server 2010

At ACE IT Solutions, our clients are always seeking cost-effective and effective communication tools that provide a reliable messaging platform. Microsoft Exchange Server 2010, the cornerstone of the Microsoft Unified Communications solution, has long been a key choice of organizations to enable rich and productive collaboration among its users. Many business are realizing great benefits…

Learn More

Mobile Virtualization – VDI for Your Smartphone

Smartphones, iPhones, iPads, tablets and Androids — employees’ personal mobile devices are playing a key role in increasing employee productivity, at the same time, they are a major pain point for businesses’ IT departments that are charged with data security and device management.  Some IT experts propose that mobile virtualization might be the anecdote to…

Learn More

Interal Data Security and Data Loss Prevention

Data protection from Internal Information Security Threats Insiders are by far the greatest cause of information security breaches.  A data breach can happen, whether malicious or accidental, and breaches are devastating to companies, both financially and to their investor/client relationships. As the WikiLeaks scandal has proven, internal data security threats are becoming the greatest risk…

Learn More

Get More Information

Use the form below to get more information about ACE IT Services and what we can do for you.

  • This field is for validation purposes and should be left unchanged.

Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.

Call (646) 558-5575
Or Request More Information

  • This field is for validation purposes and should be left unchanged.