Chi Connect is a newsletter designed for tech professionals who want quick updates on news that pertains to data networking, security, backup, storage, disaster recovery, and virtualization. That’s a lot of information to cover in a newsletter, so each edition will have a different focus and we encourage your comments and input. If you have a story, news or blog you’d like to share on Chi Connect, please contact our editor, Christine Thome, at cthome@chicorporation.com.

Below is the November/December  2018 edition – enjoy!

Get Off Your Lazy NAS with Intelligent Data Management

The challenges of data growth are plentiful. Organizations find themselves preserving data for longer periods of time while more stakeholders require access to historical data in real-time. In an effort to reduce costs, too many organizations move data into “siloed” tiers where it becomes difficult to search or use.

But you don’t have to. There’s a better way to reduce your storage costs and harness your data.

READ MORE

Disaster Recovery Testing and How to Get it Right

Too many organizations implement backup and disaster recovery solutions and assume they’re prepared to face any eventuality. After all, the solution vendor promised data recovery in minutes.

Well, that’s great, but we simply can’t emphasize enough how important it is to validate your solutions and processes. You need to find your points of failure and fix them before a real disaster strikes.

READ MORE

Company Email vs Personal Email

This month, Paul Comfort, Chi’s leading engineer, discusses the dangers of using your company email for personal use.

Among the many reasons Paul states in this article are your email and your intellectual property are not your own. Read your company policies. You will likely find that anything created, stored, or processed on company equipment is owned by the company. This means that the idea you had for a startup that you emailed to a friend can be taken and used by the business whose email you used.

READ MORE

 

Threat Hunting Meets the Challenges of a Tenacious Adversary

Dealing with an active, dedicated adversary during an incident is very different than what many consider the more “traditional” incident response process of finding and removing malware.

The traditional approach to incident response has been to remove the malware, or to go as far as re-imaging the system and placing it back into service in a “known-clean” state. 

However, dedicated adversaries are adept at persisting within a compromised infrastructure and because of this, the speed at which organizations detect and respond to these threats is critical.

Try CrowdStrike’s Falcon Prevent Next-Gen AV Free for 15 Days

Go beyond malware with endpoint protection that stops today’s threats. Prevent malware, ransomware, and fileless attacks – even if endpoints are offline.

Up and running in minutes. Immediately operational — no signature updates, no fine-tuning, no complex configurations. The fastest and easiest way to safeguard your organization against malware and breaches.

Full-featured next-gen AV trial. No credit card required.

Beer, Cheer & Southern Tier

Join the Western Digital and Chi teams for a great night of beer and cheer at Southern Tier Brewing Company in Cleveland.

We’ll enjoy some great food, taste some amazing beers and learn more about Southern Tier’s offerings through a beer flight hosted by Southern Tier’s head brewer, Jason Comeaux. Plus, we’ll give you a 64-ounce growler to fill up with your favorite beer and take home! Space is limited.

Subscribe to Chi Connect