Scott Koegler

Scott Koegler

Scott Koegler is Executive Editor for Big Data & Analytics Tech Brief

What Portion of Your Big Data Should be Deleted?

Big data is the fuel that drives many aspects of our businesses today. With this, the ability to manage large datasets has become critical to the success of a company. But even with the proliferation of various data management methods, functions and tools, most companies remain far behind in the implementation of a sound big data strategy. On the other hand, those that have a big data strategy in place often find themselves facing some issues in how they can use data to make decisions. A cross-industry strategy shows that less than half of structured data in organizations is used in making decisions, while below 1% of the unstructured data is used in doing the same. The same study notes that more than 70% of employees have access to data they should not be accessing in the first place. Read more...

Don't Overlook the Small Data

Big data continues to be a major talking point for many organizations. It is now a leading concept that continues to capture the imaginations of brand marketers and business executives looking to capitalize on it to change the landscape to their advantage. Indeed, the ability of a business to capture vast sets of data, collect vast data ranges in real-time, and process data into valuable insights can change the tide and make a business an absolute force. However, running big data is not only complicated but expensive as well.

Read more...

Does Cloud Storage Protect Your Data Against Ransomware?

 In recent years, ransomware has become mainstream and is now one of the topics cybersecurity professionals often talk about. Over the past few years, we have watched many organizations such as businesses, hospitals, government agencies, and city municipalities fall victim to ransomware attacks. Most of them are forced to part with thousands of dollars in cryptocurrencies for their files to be released. New as they may sound, ransomware attacks have been here for long, only that they have become rampant in recent years with the rise in cryptocurrencies. These attacks are characterized by systemic encryption of critical files. Once encrypted, the hacker demands a ransom to be paid by the victim before a decryption key is given.

Read more...

Visit other PMG Sites:

click me
PMG360 is committed to protecting the privacy of the personal data we collect from our subscribers/agents/customers/exhibitors and sponsors. On May 25th, the European's GDPR policy will be enforced. Nothing is changing about your current settings or how your information is processed, however, we have made a few changes. We have updated our Privacy Policy and Cookie Policy to make it easier for you to understand what information we collect, how and why we collect it.