data protection Archives - DNA IT Solutions

Tag Archives: data protection

Data Management

This guide explains how IBM helps create smarter applications and finds the right database for your app.

Data services

Deploy databases in minutes for your Watson AI-powered app

DNA IT Solutions have been chosen as one of just a few IBM Partners in Ireland. Selected based on our experience and expertise in providing customer solutions that work. We offer this enterprise cloud solution to our larger clients that have more complex requirements. We implement your transition, scoping and planning to make the transition easier.

Data Management from IBM Cloud

Create smarter applications

IBM Watson® APIs help you enable your apps and products with Al capabilities. IBM Cloud provides the persistence layers to power your Al app and get the most out of your Watson services.

Ingest

Pull in diverse data through streaming and batch ETL, and prepare it for analytics and operational use.

Persist

Choose the storage option best suited to your data — from RDBMS to every type of NoSQL

Analyze

Allow every type of user to perform the right kind of analysis

Create

Build smarter applications with embedded intelligence

Advisory Managed IT Services

Find the right database for your app

The right databases are empowering, the wrong databases are limiting. Each IBM-hosted database can be deployed in the cloud, on premises or in a hybrid environment. All IBM Cloud databases take just minutes to set up and connect to your data. Strong security (2FA, SSL, encryption), multi-node replication, high availability, auto-scaling, failover, backups, database logs, user permissions and roles, and many more features come standard with most offerings.

Cloudant:

A NoSQL JSON document store optimized for heavy workloads of concurrent reads and writes..

Compose

A database engine powering over 10 open source SQL and NoSQL databases.

Compose for Elasticsearch

Combines the flexibility of a full-text search engine with the power of JSON indexing.

Compose for etcd

A key/value store that holds the always-correct data needed to manage server clusters.

Compose for JanusGraph

A scalable graph database optimized for storing and querying highly-interconnected data.

Compose for MongoDB

Powerful indexing and querying combined with automated scaling and backup.

Compose for MySQL

A fast, easy-to-use RDBMS with connectors including Python, PHP and C++.

Compose for PostgreSQL

An object-relational SQL database with indexable JSON, pub/sub functions and drivers.

Compose for Redis

Use counters, queues, lists and hyperlogs to handle complex data issues simply..

Compose for RethinkDB

A distributed database optimized for JSON documents and the real-time web.

Compose for ScyllaDB

A NoSQL column-store that boasts 1 million transactions per second per node.

Db2 Hosted

An on-demand, multi-workload SQL database with full admin access

Db2 on Cloud

A fully-managed SQL cloud database configured and optimized for robust performance.

Db2 Warehouse on Cloud

A fully-managed, cloud data warehouse service powered by IBM BLU Acceleration.

Informix on Cloud

High-performance engine that integrates TimeSeries, Spatial, NoSQL and SQL data together.

Master Data Management (MDM) on Cloud

Gain a trusted view of data in a hybrid computing environment.

Information Server on Cloud

Understand, govern, create, maintain, transform and deliver quality data.

Lift

Migrate data quickly, easily and securely via a CLI.


Cyber Security Awareness

Download PDF

With the growing reliance on IT infrastructure a business needs to maintain high levels of security in order to protect itself from attack. Welcome to this introduction to cyber security awareness brought to you by DNA IT Solutions. This guide is one of a series that we hope will be useful to give you an insight into what you can do to protect your business from attack. Sharing these useful tips with your team could help protect your business.

Do you understand the cyber risks your business is facing? This checklist can deliver the knowledge your company needs to lower its cyber risk status.

MANAGEMENT

  • How often does the board discuss cybersecurity and how it might impact your business?
  • Are security policies enforced and updated regularly?
  • If your organisation changes direction do you have a developed plan in place to address any new cyber risks?
  • Have you established ownership across all data?

IT STAFF

  • Do you ensure that users have anti-virus software loaded and activated on systems?
  • Do you know what to do when your security has been breached?
  • Do you have programmes in place to identify and respond to cyber incidents?
  • Do you know what the biggest cyber risks are in your industry? Cyber Security Check List

USERS

  • Do you have effective cyber awareness training within every area of your business?
  • Do you delete emails from unknown sources without opening them?
  • Do you utilise strong, difficult-to-compromise passwords?
  • Are you suspicious of unsolicited contact from individuals seeking the company’s data?

BUSINESS CONTINUITY

  • Do you know what information and systems your business needs to keep operating?
  • Do you know where your business’s critical information and data is stored and who has access to it?
  • If you lost a critical system, do you have a pre-determined plan of how to restore the system?
  • Do you know what the costs will be for your business to respond to a serious cyber incident, including recovery?

If you are unable to answer any of these questions or some answers make you uncomfortable, then it could be worth you seeking out expert advice. 


GDPR – Understanding the Data Protection requirements and how to comply

GDPR DNA IT Solutions

The modern office looks a lot different than it did the last time a law was passed on data protection.

 

We now use more mobile devices in our work and personal life.  Company data is no longer just stored with the walls of an office as we move towards storage in the cloud.

With personal data breaches quite common, this not only puts people at risk of identity theft and financial loss but also puts businesses at risk of losing customer confidence.  Now that GDPR is being introduced next year the consequences will be even more severe with hefty fines.

Sophos recently published a whitepaper on the subject and you can read the full version here.  DNA IT Solutions partner with Sophos to provide an all-round solution to business IT Security and we felt it would be useful to share some of their insights with you.

Why are the changes needed?

It was recognised that there was a need to address the protection of data due to the major technological developments in the past 20 years. GDPR takes the form of a regulation, meaning that it applies directly in every member state in the form in which it was passed. The regulation is intended to strengthen the privacy rights of EU citizens, restore confidence in online activities and better protect customer data by requiring companies to adopt new data protection processes and controls.

Significant elements of reform

GDPR addresses the security of processing data and how organisations need to implement appropriate security measures to protect personal data. It makes specific reference to ‘encryption of personal data’ as one of the means to achieve this.  In regard to encryption technology, this means having a robust key management procedure in addition to encrypting your data. The wider implications are having a sound disaster recovery plan in place.

The consequences

Failure to comply could mean files of up to €20million or 4% of the total turnover whichever is higher. If you don’t put the right technology in place to protect personal data, then you may have to pay – directly to the supervisory authority and indirectly from reputation damage, and loss of goodwill and customer trust. However, companies that encrypt their data protect their customers and themselves.

How Sophos helps you meet the data protection challenge

A solid data protection strategy isn’t built in a day. But consider that 57% of data breaches are due to hackers or malware and 23% of data breaches are caused by unintended disclosure (human error). Securing against these threats is a great place to begin and Sophos recommends three steps to achieve it.

  1. Stop the top causes of data loss

Malicious attacks and accidental loss or theft are two major causes of data breaches. Sophos Central Device Encryption is the easiest way to manage full disk encryption for all your PCs and Mac computers centrally. Full disk encryption is the most basic form of encryption and it’s widely recommended that all computers use it to protect data at rest. It will keep your data secure in the event that a device is lost or stolen.   Sophos Mobile extends similar protection to data on your mobile devices.

Sophos Intercept X works alongside your existing antivirus protection to provide advanced anti-malware, anti-exploit and anti-ransomware protection – keeping you safe from the latest data-stealing attacks.

  1. Stop threats at the door

With todays’ increasingly sophisticated and aggressive malware attacks, having a multi-layered security setup that can stop attacks at every level of your network is essential. XG Firewall protects your network devices by stopping these attacks at the perimeter, before they get to your devices.

Sophos Email Appliance automatically blocks or encrypts sensitive emails and attachments (e.g. PDFs) ensuring your data is always protected, and suspect emails are stopped before they reach your users’ inboxes.

  1. Stop human error

Most of us have sent an email to the wrong person at some point. But when sensitive data is involved that innocent mistake can become a costly fine. The file-level encryption delivered by Sophos SafeGuard means that even when data leaves your devices or network (e.g. email attachment, cloud storage) it stays protected – so even if you suffer a data breach the chance of a fine is greatly reduced.

 

DNA IT Solutions have already put in place many of the measures that Sophos refer to for our clients.  If you want to find out more about how Sophos can protect your business, please get in touch with us today.