As we’ve seen in recent years, natural disasters can lead to long-term downtime for organizations. Because earthquakes, hurricanes, snow storms, or other events can put data centers and other corporate facilities out of commission for a while, it’s vital that companies have in place a comprehensive disaster recovery plan.
Disaster recovery (DR) is a subset of business continuity (BC), and like BC, it’s being influenced by some of the key trends in the IT industry, foremost among them:
- Cloud services
- Server and desktop virtualization
- The proliferation of mobile devices in the workforce
- The growing popularity of social networking as a business tool
These trends are forcing many organizations to rethink how they plan, test, and execute their DR strategies. CSO previously looked at how these trends are specifically affecting IT business continuity; as with BC, much of the impact they are having on DR is for the better. Still, IT and security executives need to consider how these developments can best be leveraged so that they improve, rather than complicate, DR efforts.
Head over to the source and see how IT disaster recovery is being impacted by each of the four.
- 33 Cloud Service Providers Join Zerto Cloud Disaster Recovery Ecosystem (sys-con.com)
- Symantec and Microsoft team for disaster-recovery service (techworld.com.au)
- Colocation’s role in Disaster Recovery & Business Continuity (cashzilla.wordpress.com)
Great series starting over at Krebs on Security on how to get into the field.
At least once a month, sometimes more, readers write in to ask how they can break into the field of computer security. Some of the emails are from people in jobs that have nothing to do with security, but who are fascinated enough by the field to contemplate a career change. Others are already in an information technology position but are itching to segue into security. I always respond with my own set of stock answers, but each time I do this, I can’t help but feel my advice is incomplete, or at least not terribly well-rounded.
I decided to ask some of the brightest minds in the security industry today what advice they’d give. Almost everyone I asked said they, too, frequently get asked the very same question, but each had surprisingly different takes on the subject. Today is the first installment in a series of responses to this question. When the last of the advice columns have run, I’ll create an archive of them all that will be anchored somewhere prominently on the home page. That way, the next time someone asks how they can break into security, I’ll have more to offer than just my admittedly narrow perspectives on the matter.
Read the whole interview: How to Break Into Security, Ptacek Edition — Krebs on Security.
- Small businesses sitting ducks for hackers (charlotteobserver.com)
- Learning from History – The Importance of IT Security (blogs.gartner.com)
- Thomas Ptacek Interview – Episode 292 (pauldotcom.com)
Security is a major aspect of IT. One of the great ways to take one’s IT security training to the next level is to obtain a CompTIA certification. Here’s part of a great interview that Techopedia recently did with CompTIA’s director of product management, Carol Balkcom.
Techopedia: Many know CompTIA for its A+ certification. Tell us about your other security offerings.
Carol Balkcom: CompTIA Security+ is our first exam devoted entirely to security, and it was originally launched in 2002. All of our exams are “vendor neutral”, meaning that they aren’t tied to any one vendor’s products – and Security+ is no exception.
CompTIA A+ and Network+ also have security components in them, because of course today’s support technicians and network administrators must also be knowledgeable about security. As an aside, all three of these exams (A+, Network+, Security+) are on the U.S. Department of Defense Directive 8570 that requires certification for information assurance personnel. As a result, a large number of professionals have taken these certifications over the last few years.
To get back to our security offerings, earlier this year we formally launched the first in CompTIA’s “Mastery” series of exams, our CompTIA Advanced Security Practitioner (CASP).
Techopedia: Tell us more about Security+. What major subject areas are covered and who is the primary audience?
Carol Balkcom: The primary audience for Security+ is IT professionals with two or more years of hands-on, technical information security experience. There are Security+ certified professionals in all types of organizations, from the U.S. Navy to General Mills to the Archdiocese of Philadelphia. As to the subject areas in Security+, the broad knowledge “domains” are network security, compliance and operational security, threats and vulnerabilities, application, data and host security, access control and identity management, and cryptography.
Techopedia: What about CASP? Can you tell us more about the designation?
Carol Balkcom: For the CompTIA Advanced Security Practitioner (CASP), we recommend at least 10 years in IT and five years of hands-on technical security experience. It is intended for the security architect working in a large, multi-location organization. The CASP also looks at the security implications of business decisions, such as the acquisition of one company by another, as an example.
Be sure to check out the rest of interview, which includes Ms. Balkcom’s take on the certification vs. experience question.
General Dynamics Information Technology (IT) Staffing Lead Robert Cellich, based in Tampa, Fla., seeks qualified individuals to fill on average 300 positions a year to support General Dynamics IT’s military services sector. But what constitutes a candidate as “qualified”? The right combination of hard and soft skills, credentials and attitude.
Roughly nine out of 10 jobs that Cellich fills require security clearances, a determination by the United States government that a person or company is eligible for access to classified information. “Cleared individuals aren’t hard to find,” he says. “What’s difficult to find is a cleared individual who has the right qualifications for the position.”
“I’m looking for individuals who have polished hard and soft skills,” he says.
For ‘hard skills,’ Cellich looks for demonstrated, hands-on proficiency in the technical areas the job he is seeking to fill. When considering a candidate for a higher level role, he scrutinizes the positions listed in the candidate’s resume—the type of position, the type of company, and length of tenure—to see if the person has relevant, quality experience.
“I’m not going to hire somebody for a senior role who has only a year or two of experience because they’re just not ready for that type of role yet,” Cellich says. When filling a system administrator position, for example, Cellich will prefer candidates who have performed that role. “Whereas the person who has been in a help desk role for 10 years—whose resume shows no discernable system administration experience, lacks steps taken to grow into system administration, fails to demonstrate an effort to get their MCSA (Microsoft Certified Systems Administrator certification)—is still at the help desk level and is unlikely to be prepared for system administration.”
Training and certifications can be huge, especially if a candidate lacks experience.
IT-related training, certifications and degrees can help candidates with less experience. For Cellich, an IT certification gives the candidate credibility by demonstrating that the individual has the capacity and the motivation to learn the trade. “Our customers often want individuals with certifications, because it shows that the person has the capability of doing a specific type of work.”
Cellich has one caveat: “Don’t just go and take the training and not get the certification. It’s almost a negative, because my first question will always be ‘Why didn’t you get the certification?’”
Entry level candidates with an IT certification can still have difficulty obtaining full-time IT work experience in a tough economy, and Cellich recommends that IT job hunters volunteer or obtain a part-time position working with IT as an alternative. “Anything you can put down on resume shows that you have used some of the things you have learned will put you a step ahead of the person who hasn’t done that.”
It’s highly likely that the way General Dynamics defines “qualified” is the way many companies do. So be sure to stay-up-to-date on skills and knowledge. At the same time utilize various avenues to gain experience if you don’t have it.
Head over to the source for some tips on that resume.
- A Test And MCSA Certifications “The Simplest Way To Gear Up To Be Licensed? (pctechmojo.com)
- Role of certifications in IT industry (thoughtlessthoughtsofdilliwalas.wordpress.com)
- Best Paying IT Security Jobs In 2012 (informationweek.com)
It’s that time again where CompTIA updates its’ Network+ exam.
CompTIA released its updated CompTIA Network+ exam (English only, initially) on Dec. 1. The revised Network+ objectives address virtual networking and give increased attention to network security and coverage of the seven-layer OSI (Open System Interconnection) model. Click here to download a breakdown of exactly what is covered on the new exam.
Here’s what ComTIA’s research showed:
CompTIA research on US Small and Medium Businesses (SMBs) found that network efficiency and robustness were among the top items SMBs plan to address immediately, paving the way for other strategies such as cloud computing or unified communications.
Forty-eight percent of server technicians surveyed by CompTIA say that deeper networking knowledge is required when supporting servers in a cloud environment.
Among server technicians and managers of server technicians, 28% say that virtualization is a current focus, but 60% say that it is becoming a larger focus.
So you’ve applied for that IT job and you’ve made it to the interview stage. Here are some tips from Venture Loop CEO Jeremy McCarthy on how to make it a successful interview.
Regardless of how you view this prospective opportunity, always do your best in the interview for you never know where it may lead you. Some of his other suggested tips:
1) Research: With everything literally at our fingertips today, it’s close to blasphemy to enter an interview without having searched and studied as much about the history, fact and figures of the company with whom you are interviewing as possible. Savy online searching can turn up valuable information to prove to an employer they’d be hiring an expert in their industry.
2) Review your triumphs and faults: You can almost guarantee that typical questions such as your vision for five years down the road, strengths, weaknesses, tough work situations and best type of person to work for will be asked, so why not write down your answers ahead of time to review rather than spin your wheels while sitting in ‘hot seat.’
3) Behavioral question awareness: More firms rely on behavioral interviewing techniques to see how candidates answer when asked for specific examples of past professional situations. McCarthy presents some typical queries to prepare for ahead of time:
- How you handled not meeting a deadline
- How you dealt with conflict with a co-worker or boss
- What you did when someone else’s actions caused failure
- When did you show initiative
- What did you do when a customer was upset with you
- What did you do when a co-worker blamed you unfairly for something
For the rest of Mr. McCarthy’s tips check out the source.
- Strange interview questions tech companies ask revealed (zdnet.com)
- Job Search Tip: How to Eliminate Anxiety before an Interview! | Ashley Ellis (skillsinfo.wordpress.com)
Very interesting. If you are an IT contractor what are your thoughts? Would you agree?
Powered by ScribeFire.
- Confessions of a really new blogger (e1evation.com)
- Trend Watch: TechInsurance Notes Increase in Contract Requirements for E&O Insurance (prweb.com)
An interesting prediction by Gartner.
“The need for computing hardware, either in a data center or on an employee‘s desk, will not go away,” Gartner said. “However, if the ownership of hardware shifts to third parties, then there will be major shifts throughout every facet of the IT hardware industry. For example, enterprise IT budgets will either be shrunk or reallocated to more-strategic projects; enterprise IT staff will either be reduced or reskilled to meet new requirements, and/or hardware distribution will have to change radically to meet the requirements of the new IT hardware buying points.”
If Gartner is correct, the shift will have serious implications for IT professionals, but presumably many new jobs would be created in order to build the next wave of cloud services.
But it’s not just cloud computing that is driving a movement toward “decreased IT hardware assets,” in Gartner’s words. Virtualization and employees running personal desktops and laptops on corporate networks are also reducing the need for company-owned hardware. (Source: InfoWorld)
Check the source link above to see other Gartner predictions.
Related articles by Zemanta
- Gartner issues its own 2012 prediction: end of IT as we know it (blogs.zdnet.com)
- 5 must-have IT management technologies for 2010 (computerworld.com)
- Microsoft, HP push businesses to clouds (news.cnet.com)
- Gartner predicts: Mobile Web overtakes PCs, Facebook wins, more outsourcing (seattletimes.nwsource.com)