Security

Wall Street Journal Touts the Importance of CIOs

An article in today’s Wall Street Journal by writer John Bussey says it’s time for CIOs to start reporting to the top: “Even though data security is a 21st century priority, at many companies, the organization chart is still firmly back in the 20th century.” In the wake of the Sony Playstation hacker attack, companies…

Learn More

Protecting Businesses from the Fate of Sony PlayStation

Sony was hacked and is now facing billions of dollars in lawsuits in the wake of security breaches of its PlayStation network — a breach that exposed tens of millions of its customers’ account data, including credit card information. There are strict regulations covering the storage and care of customers’ financial data, but the incidents…

Learn More

Disaster Preparedness: Is Your IT Department Ready?

The recent cataclysmic events that have struck Japan in the wake of the massive earthquake and subsequent nuclear disaster should serve as a serious wake-up call about the need for an effective disaster recovery and business continuity plan. Hurricanes, tornadoes, floods, blizzards, and fires are all conspiring against your business. Is your business prepared to…

Learn More

Planning to Fail: Six Tips for Smart Contingency Planning

Positive thinking will only get you so far and will be of little help should your network goes down. Think of a business continuity plan as an insurance plan for your technology infrastructure and your valuable data. Consider the repercussions to your business if you lost data or your technology infrastructure failed. How do you…

Learn More

Interal Data Security and Data Loss Prevention

Data protection from Internal Information Security Threats Insiders are by far the greatest cause of information security breaches.  A data breach can happen, whether malicious or accidental, and breaches are devastating to companies, both financially and to their investor/client relationships. As the WikiLeaks scandal has proven, internal data security threats are becoming the greatest risk…

Learn More

Cloud Computing Security

This is the third installment in our series on Cloud Computing. Previous posts discussed why cloud computing is a technology you can’t afford to ignore and the differences between private and public clouds. This week, we focus on the security of the cloud. Many businesses that should be benefiting from cloud computing are dissuaded due…

Learn More

Better Data Security & Identity Protection Through Passwords

Are bad password habits putting your identity and your personal data at risk? A recent study conducted by internet security provider Webroot, claims that poor password practices are putting consumers’ identities in a vulnerable position. According to Jeff Horne, Director of Threat Research at Webroot, “We’re seeing between 40,000 to 100,000 new samples of malware…

Learn More

Get More Information

Use the form below to get more information about ACE IT Services and what we can do for you.

  • This field is for validation purposes and should be left unchanged.

Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.

Call (646) 558-5575
Or Request More Information

  • This field is for validation purposes and should be left unchanged.