fbpx

Blog

Powered by the team at Connectria

 
Get in the Zone! Multi-Account Cloud Set-Ups Made Easier
Last updated April 6, 2020 For organizations looking to quickly establish a secure and scalable multiple-account AWS environment, the task may appear overwhelming – at…
 
IBM i vs. AS/400: Getting Clear on the Difference
The IBM Power Series, running the IBM i operating system, has a long history. And with a long history come certain terms and jargon that…
 
The New ODBC Driver for IBM i, and What it Means for Business
Recently, the IBM i Open-Source Software team ported their IBM i Access ODBC Driver so it could work directly on IBM platforms. While this might…
 
AWS
Amazon FSx: More Good News for Those Looking to Run Windows Workloads in an AWS Cloud
I often get asked some variation of the question, “Can I run Windows on AWS?” The answer is an emphatic “yes!” In fact, Connectria has…
 
AWS
FAQ: Should I use AWS Transfer for SFTP?
I hear this question most often from customers migrating legacy applications to AWS. To answer this question, let’s do a quick review of some of…
 
Passwords and Users with Superpowers: Two Common Security Risks and What to Do About Them in IBM i
In our previous post about HelpSystems’ annual State of IBM i Security study, we recapped one key theme the report unearths every year. The highest…
 
Protecting Your Healthcare Data Against Unauthorized Access or Disclosure
As reported by the HIPAA Journal, October 2019 was the worst month for healthcare data breaches on record, with a total of 52 incidents reported.…
 
IBM i Security Issues Aren’t Technical: They’re Cultural
For the past 16 years, IT firm HelpSystems has published a yearly “state of IBM i” security study. Year after year, the report uncovers consistent…
 
Identifying & Overcoming Security Challenges in the Cloud
More than likely, you’re aware that cloud computing options have significantly changed the IT landscape for many organizations. As such, chances are rather good that…
 
What are Options for IBM i Backup Solutions? (And How is This Different from Data Recovery?)
Web architects and IT leaders are increasingly offloading IBM i backup solutions and other workloads to the cloud. Cloud backups and data recovery offer improved…
 
Securely Migrate LARGE Amounts of Data with AWS Snowball
The nice thing about transferring data is that it doesn’t weigh much. The right connection and anyone can do it, right? Well, despite the ethereal…
 
9 Surprising Business Activities Affected by HIPAA Compliance
Is your organization affected by HIPAA compliance rules? Are you worried about HIPAA violations? The answer should be clear-cut until you realize just what the…
 
Cloud Control for the Forward-Thinking CTO
Today’s CIOs and CTOs understand that growing complexity in their infrastructure means growing complexity in their IT management strategies. However, as technology rarely develops in…
 
7 Tips for a Successful Multi-Vendor Cloud Migration
As much as an organization might try to control the number of technology vendors they work with, there are almost always several organizations involved –…
 
Protect Your Clients, Their Customers, AND Yourself with Regulation Compliant Hosting
For many businesses, compliance is an essential component of what you do and how you protect your customers. Whether you’re in the healthcare sector, financial…
 
Who Does HIPAA Protect? And What Does This Mean for Your IT Team?
Many experts are eager to point out the what and the how of HIPAA compliance: What protected health information (PHI) is included? How should it…

Subscribe to our Blog!