By: Paul L. Kendall, Accudata Systems What is the GDPR? In December 2016, the European Commission (EC) gave its final approval to the General Data Protection Regulation (GDPR). GDPR is a massive overhaul of the EU's 1995 data protection rules…
Accudata Systems Data Center Practice Manager Thanh Nguyen explains why disaster recovery is critical to your cloud strategy and provides real-world examples to validate your investment in this quick video.
Accudata Systems Data Center Practice Manager Thanh Nguyen explains how companies can combat ransomware in 3 simple steps.
Malware, Exploits, Command and Contol Communications, Data Loss -- how do we address these threats when they use encrypted channels? Many organizations have numerous network security tools, such as IPS, Anti-Malware, Anti-Spyware, and Data Loss Prevention solutions that are blind…
PCI QSA, Ismael Alfaro shares the top 10 priorities for PCI 3.2 in our short video. Highlights include key considerations for planning for and executing on achieving compliance over the next six months. While some changes in 3.2 are minor, there are others, including multi-factor authentication requirements that take significant planning and implementation timelines.
Patrick Vardeman, CEO of Accudata Systems, Inc. joined Texas Business Radio in April to discuss the importance of investment in information technology. Executive Leadership and IT alike, this video is for you.
The Citrix NetScaler SD-WAN improves WAN throughput, branch office application reliability and security, and improves the end-user experience. Watch our exclusive webinar to learn how the Citrix SD-WAN solution is a game changer.
If you’re running Windows Server 2003 with IIS 6.0 with WebDAV enabled, a recently-discovered exploitable vulnerability allows a remote attacker to run code against the application software and take control of the machine. The attacker could inject code and commands and get feedback, taking control of operating system level functions. This means that your critical data and intellectual property are at risk of compromise.
A May 2016 survey of over 3,000 IT leaders by IT outsourcer Harvey Nash and auditing firm KPMG found that 65% report a skills shortage, while 44% expect to need to expand their IT teams despite the shortage. Also, 89% of CIOs noted that talent retention is a challenge as well.
Protecting your network is a top priority. But today’s advanced threats require more than just a solid perimeter. You have to protect every piece of your network. Accudata Systems’ Vid Sista explains more in this short technology insights video.