(877) 859-TIER

TalkingPoint | A TierPoint Blog

Shopping for a Colo Provider This Season? 10 Tips

As shoppers head to malls and cyber-sales looking for elusive “must-have” gadgets and deals, you may have a less traditional item on your wish list – a colo (colocation) provider. For some of us, a pair of blue-blocking glasses or virtual reality gear would be nice,...

read more

Top 3 Healthcare Information Security Challenges

The healthcare industry is faced with the challenge of protecting patient data as it embraces more and more digital health technologies, ranging from wearables; diagnostic equipment; telemedicine tools; mobile care apps; and data-driven software platforms. While new...

read more

5 Key Types of DDoS Attacks & How to Mitigate Them

Guest blog post by Carl Herberger, Vice President, Security Solutions at Radware Since the first Denial-of-Service (DoS) attack was launched in 1974, Distributed Denial-of-Service (DDoS) attacks have remained among the most persistent and damaging cyber-attacks....

read more

Today’s DR Strategy Demands DRaaS

Not so long ago, a disaster recovery strategy meant backing up the servers once or twice a day and shipping the tapes off-site for safe keeping.  Today, a DR strategy means designing backup and recovery plans for servers that may be on-premise or off-premise, real or...

read more

Hybrid Cloud and Multi-Cloud Mix Dominate Deployments

There are clouds on the horizon for 2018 – lots of them. According to new data from 451 Research, companies are spending more than ever on hybrid cloud environments and multi-cloud services and they’re investing in all types of cloud infrastructures.  Nearly 90% of...

read more

DRaaS for Ransomware Attacks

DR planning with Disaster-Recovery-as-a-Service (DRaaS) has a brilliant application: It can help protect your business during ransomware attacks, securing your backups and restoring your data, potentially in minutes. Good DRaaS providers follow strict guidelines and a...

read more

Web Application Security Risks Are Escalating

Safeguarding your data and applications requires staying up to date on the latest threats. But not all successful hacks or malware infections are new threats. In fact, a large percentage of attacks on IT systems leverage previously known – even old—vulnerabilities...

read more

Business Continuity: Moving from Disaster to Recovery

If you’re like most executives, a natural disaster ranks as one of your worst nightmares. And if it seems like disasters are occurring more often, that’s because they are. Based on inflation-adjusted government tracking, nearly twice as many billion-dollar...

read more