Take the World Backup Day Pledge

Springtime is a great time to backup your data! If data is important to your job, you get used to backing it up often. Then, in the event of any failure that results in data loss, you simply retrieve your data from the most recent backup. It can be a lifesaver.

The post Take the World Backup Day Pledge appeared first on Global Knowledge Blog.

Read more

How Data is Delivered

Every second of every day, data is being sent and received. Billions of data packets are processed by your company’s network every day. In fact, you received dozens of packets just to read this article, but the vast majority of us have no idea how this works. People have no clue as to what goes on behind the scenes to ensure data actually gets to the right device.

Read more

Course Spotlight: Cloud Workload Planning

It’s inevitable that your company will migrate a workload to the cloud. Since there’s no escaping it, we have launched a new, exclusive course (Cloud Workload Planning) to help stakeholders understand the process of planning a workload migration and selecting a cloud provider. This vendor-neutral, non-technical course provides hands-on exercises and a case study to help you avoid unnecessary surprises as your company undergoes a cloud-based transformation.

Read more

Microsoft Certifications Excel in Four Key Areas

Stop for a minute and consider the range of Microsoft’s offerings and the longevity of its creations. This is a company that has not only given the world what is perhaps the gold standard in desktop publishing and office productivity software (Microsoft Word, Excel, Outlook, etc.) but it’s also infiltrated our home lives as well through gaming and portability. (We’re looking at you, Xbox and Surface!) Microsoft is the foundation for an incredible number of businesses; eighty percent of the Fortune 500 is on the Microsoft Cloud. More than 400 million devices are running Windows 10. In short: Microsoft is everywhere.

Read more

How To Protect Data in Flight

Accessing cloud-based resources, whether they be IaaS/PaaS/SaaS-based, is very convenient. With a browser and Internet connection, you are up and running. No driving to your work office, no need to log into the corporate network. Just open up your web browser and go. This convenience, however, comes with a security risk. All of your business work is conducted over an insecure communication network. Unlike your office network, where the network link between you and the data center is under corporate control and is physically secure, the cloud access link is over the Internet. The wild, uncontrolled, used-by-everyone-in-the-world Internet. There are no guarantees about who else has (or does not have) access to your network communication link. In fact, from a security perspective, we assume that the cloud link (i.e., the Internet) is unsecured and hostile. Any sensitive or private information WILL be accessed by someone else. This is why we have a need to protect “data in flight.” The data may be safe once it gets to the cloud provider, but during the transmission we need to protect it and ensure it remains private. To ensure secure communication across the Internet, a key fundamental cloud security principle is to encrypt the data transmission whenever you engage with a cloud resource. In this blog we introduce the security concept of protecting “data in flight” and explain how it operates.

Read more