Jonathan Halstuch (@jahgt) 's Twitter Profile
Jonathan Halstuch

@jahgt

Computer Engineer, CTO RackTop, Skier, Traveler

ID: 223076506

calendar_today05-12-2010 09:31:25

638 Tweet

243 Followers

280 Following

RackTop Systems (@racktop) 's Twitter Profile Photo

How it started ➡️ how it's going Join us next week for our annual #racktoberfest celebration with live music, pretzels, German beer and food 🥨🍺🇩🇪 Register here: hubs.li/Q021_DkB0 Did we mention swag? Here's a sneak peak of the 2023 tee. Limited quantities available.

How it started ➡️ how it's going

Join us next week for our annual #racktoberfest celebration with live music, pretzels, German beer and food  🥨🍺🇩🇪

Register here: hubs.li/Q021_DkB0

Did we mention swag? Here's a sneak peak of the 2023 tee. Limited quantities available.
RackTop Systems (@racktop) 's Twitter Profile Photo

According to Gartner®, “the cost of recovery and resulting downtime in the aftermath of a #ransomware attack, and the cost of the reputational damage, can amount to 10 times the amount of the ransom itself.” Read more in the report: hubs.li/Q022yTLr0 #datasecurity

According to Gartner®, “the cost of recovery and resulting downtime in the aftermath of a #ransomware attack, and the cost of the reputational damage, can amount to 10 times the amount of the ransom itself.” Read more in the report: hubs.li/Q022yTLr0 #datasecurity
RackTop Systems (@racktop) 's Twitter Profile Photo

Why isn't ransomware recovery enough? According to Gartner, “Recovery can be devastatingly slow, isn’t 100% reliable and will not protect you from data extortion, exfiltration or advanced attacks.” Read Top Trends in Enterprise Data Storage 2023 hubs.li/Q022BkGF0

Why isn't ransomware recovery enough? According to <a href="/Gartner_inc/">Gartner</a>, “Recovery can be devastatingly slow, isn’t 100% reliable and will not protect you from data extortion, exfiltration or advanced attacks.” 

Read Top Trends in Enterprise Data Storage 2023 hubs.li/Q022BkGF0
RackTop Systems (@racktop) 's Twitter Profile Photo

Jonathan Halstuch, Ray Lucchesi, and Jason Collier discuss the intersection of storage and cyber subject matter experts on the latest GreyBeards on Storage episode. Give it a listen: hubs.li/Q025SBG30 #cybersecurityawarenessmonth #greybeardsonstorage

RackTop Systems (@racktop) 's Twitter Profile Photo

RackTop Systems was named a Sample Vendor for Cyberstorage in the July 2023 Gartner® Hype Cycle™ for Storage and Data Protection Technologies. Check out our #cyberstorage solution in booth 202 at #GartnerIO Gartner hubs.li/Q029vzS60

RackTop Systems was named a Sample Vendor for Cyberstorage in the July 2023 Gartner® Hype Cycle™ for Storage and Data Protection Technologies. Check out our #cyberstorage solution in booth 202 at #GartnerIO <a href="/Gartner_inc/">Gartner</a> hubs.li/Q029vzS60
RackTop Systems (@racktop) 's Twitter Profile Photo

What is cyberstorage? Download the Gartner report, Top Trends in Enterprise Data Storage 2023, to learn why I&O leaders should prioritize this investment. hubs.li/Q02bxvVp0

What is cyberstorage? Download the <a href="/Gartner_inc/">Gartner</a> report, Top Trends in Enterprise Data Storage 2023, to learn why I&amp;O leaders should prioritize this investment. hubs.li/Q02bxvVp0
Jonathan Halstuch (@jahgt) 's Twitter Profile Photo

Organizations looking to steal data or influence a situation will do a lot and go through multiple steps and attempts to accomplish the objective. therecord.media/russian-campai…

RackTop Systems (@racktop) 's Twitter Profile Photo

In the rapidly evolving landscape of cyber threats, improving cybersecurity is essential for protecting sensitive information and maintaining business continuity. Learn more about 3 big misconceptions that can undermine your efforts. hubs.li/Q02GgXHS0

In the rapidly evolving landscape of cyber threats, improving cybersecurity is essential for protecting sensitive information and maintaining business continuity. Learn more about 3 big misconceptions that can undermine your efforts. hubs.li/Q02GgXHS0
Jonathan Halstuch (@jahgt) 's Twitter Profile Photo

Probably time for enterprises to consider what devices they let connect to their network including those of consultants. But even more important they need better visibility into what data is being accessed and perform behavior analysis to stop these threats and insider threats.

RackTop Systems (@racktop) 's Twitter Profile Photo

Happening tomorrow! #Dod and federal contractors will learn: -How to understand #CMMC requirements and build a #compliance roadmap using available technology solutions -How to avoid common legal pitfalls and institute long-term strategies Register: hubs.li/Q02SwPLy0