If your business thinks it does not allow you to schedule controlled downtimes on services, you’re doomed to a major issue when an unexpected failure occurs.
The new encrypting virus campaign not only requires a ransom to recover your data, but also shows how things must go bad to make it successful.
If you are a WCSP and work with Linux for network administration, perhaps this little how-to is for you.
I’ve been thinking about this post for several months, and finally found the time and right inspiration to go on with it. My personal, hopefully shared, opinion about how IT is evolving and how we do live it from a psychological perspective.
I have been working as an IT professional since late 1990s. I had the chance to build a horizontal skillset that allowed me to approach almost any IT related project. Since 2005 my role has mainly been as CTO in different companies, spacing between small ISPs and System Integrators. My main area of interest has been IT Architecture, Network and Data Security and protection.
Since 2017 I am workig on a new platform for Intellectual Property and Copyright assets protection and management and founded a company called Rights Chain. The Company's vision is to create a comprehensive platform for effective management and protection of Intellectual Property and digital assets, as well as facing ethical issues like Reputation and Privacy.