An Inside Look at Data Recovery – Q&A with Amy Henderson
Hardware failure, viruses, catastrophic disaster, human error… what’s the common thread in this list? All present a serious risk to sensitive data, and could potentially bring any unprotected company to a standstill. Amy Henderson, our i365 partner and data recovery liaison, is all too familiar with the elements that pose a threat to business-critical data. In this day and age, it’s unrealistic to expect that data will be safe from loss or attack without employing at least some method of data safeguarding. Which is why it’s surprising that approximately 40 percent of companies do not have resources dedicated to disaster recovery. We spoke with Amy to find out not only what threats exist, but also what business owners can do to protect themselves.
Newtek Technology Services: What is the difference between “data backup” services and what people consider “data storage,” or is there a difference?
Amy Henderson: Everyone stores data (whether it’s storing an email in an archive folder, saving an Excel or Word document to their PC or storing data to an external hard drive.) This is all considered “data storage.” “Data backup” on the other hand is a repeatable process in which amounts of mission critical data are routinely backed up and held in a secure offsite location so in the event of a site disaster, the company’s or individual’s data is protected.
Custom Solutions Revisited: UCSF School of Nursing
Employs VPN for New Site Launch
You may remember an article from our September issue that provided an overview of our custom solutions. As a follow up, we recently spoke with custom solutions client, James Tran, who is a programmer/analyst with the University of California San Francisco (UCSF) School of Nursing.
This summer, James was tasked with building a reliable and secure solution for the UCSF School of Nursing’s new internal website.
“We wanted to be certain that when our site launched in October of this year, we’d be operating in a fully-protected environment,” said James. “We just couldn’t risk leaving our dedicated server out in the open – firewall protection wasn’t enough to give us the peace of mind we needed.”
Working with the NTS Custom Solutions Team, James ultimately decided a Virtual Private Network (VPN) would be the best solution. Essentially, a VPN provides an encrypted tunnel designed to enable secure communication within a given network, ensuring that only authorized users can access it.
Technically Speaking With… Tim Gamory
It’s been a tough few years for everyone caught in the grips of this recession. However, as difficult as things are for individuals and businesses, things are even tougher for charities and non-profits. That is why it’s important now, more than ever before, to give. Whether it’s time, money, goods or expertise, even the smallest thing can make a big impact. And Charity Navigator (www.charitynavigator.org), the nation’s largest and most-utilized independent evaluator of charities, is helping individuals make the most of their donations. For this month’s Technically Speaking With… column, we spoke with Tim Gamory, Charity Navigator’s Chief Information Officer, to learn more about the organization as well as how people can help their favorite non-profit during this crucial time.
Newtek Technology Services: What is Charity Navigator and how did the idea for it come about?
Tim Gamory: Charity Navigator was founded in 2001 on the premise that people are amazingly generous and derive great satisfaction from helping others, but are not always sure how to help. Our founders envisioned an unbiased source of information that would assist givers from every state, and with every type of charitable interest, in finding a charity to support. Using our objective, numbers-based rating system we have assessed the financial health of 5,500 of America’s charities. Millions of people visit our website annually resulting in our ratings influencing an estimated $10 billion of charitable giving last year.
Rather than boring you with over-hyped marketing speak about NewtPay, our newest credit card processing solution, we’re just going to jump right into the top three reasons you should care about this new program. NewtPay serves two audiences: developers/resellers, and merchants. We’ve arranged the two groups in no particular order so as to not show any favoritism to one particular audience. Listed in order of favoritism (kidding):
Web Hosting and IPV4 Depletion
Nathan Kiel, Senior Network Administrator II
I don’t think I’ll shock anyone by saying that the Internet has been growing exponentially since it began forty years ago. With all that growth, many things have changed: text-based browsers are evolving into “augmented reality” browsers, text-only web pages are now database driven, dynamic and Flash-based interactive portals, mobile devices are quickly becoming the method of choice for participation with the web, and more. One thing that hasn’t changed, however, is the backbone of the Internet: the Interned Protocol. When it was developed as the basis for the World Wide Web, common wisdom was that the address space devised was virtually unlimited (current IPv4 allows for over 4 billion addresses). However, it appears that this turned out to be wishful thinking.