Data Backup

Next Level Backup Protection

Next Level Backup Protection

Next Level Backup Protection Physical and logical security are two important factors when considering backup files. Modern restore capabilities allow for entire virtual machines and systems to be brought back online from a backup very quickly,...

Phishing for Your Network Access

Phishing for Your Network Access

Right now, the most popular phishing email subject line is “COVID-19 payment.” Why would your employees NOT click on that? What can you do?

Hackers Use Coronavirus to Exploit Human Nature

Hackers Use Coronavirus to Exploit Human Nature

Hackers are using coronavirus to exploit people’s desire to investigate the worrisome nature of this new threat by burying malicious code in seemingly harmless Covid-19 incidence maps.

Real Life Ransomware Protection with Global Data Vault

Real Life Ransomware Protection with Global Data Vault

Real Life Ransomware Protection with Global Data VaultFor most clients, Global Data Vault's services are a powerful but mostly invisible security blanket, working quietly in the background to safeguard company data. It's only when things take an unexpected turn for...

Cloud Mobility – Buzz Words or Pain Point?

Cloud Mobility – Buzz Words or Pain Point?

Cloud Mobility – Buzz Words or Pain Point?Do an internet search on “cloud mobility,” and you will get a TON of results.  The definition(s) can be confusing, but basically it describes the ability to avoid locking in workloads to a specific cloud vendor. ...

The Air Gap Controversy

The Air Gap Controversy

The Air Gap Controversy In a previous blog post, we talked about the 3-2-1-1 data protection concept as well as “air gaps.” We’ve also discovered that viruses can corrupt files that are written to air-gapped technologies, such as tape, rendering them useless, and the...

How to keep Ryuk ransomware from interrupting your business

How to keep Ryuk ransomware from interrupting your business

Prevent RYUK ransomware from interrupting your businessOctober is National Cybersecurity Awareness Month and, according to TechNewsWorld.com, in an article published in  October 2019, “the global damage from ransomware could cost US$11.5 billion this year […] while...

A Look at Global Data Vault’s Enhanced Data Protection

A Look at Global Data Vault’s Enhanced Data Protection

In Veeam Backup and Replication 9.5 Update 3, Veeam introduced a feature called “Insider Protection,” and updated it for the most recent release of Update 4. Insider Protection is a method used to combat the malicious or intentional (and perhaps even accidental)...

The truth about Office 365 backup

The truth about Office 365 backup

The truth about Office 365 data backup  For years, Microsoft customers have been able to take advantage of cloud-based offerings for all or parts of the Microsoft Office Suite, Microsoft Exchange, Microsoft SharePoint, and OneDrive.  This “Office 365” (O365)...

Hackers Attacking International Suppliers

Hackers Attacking International Suppliers

Hackers Attacking International SuppliersCybercrime exploiting vulnerabilities in international supplier's networks There’s a saying, “Make sure everybody in your boat is rowing and not drilling holes when you’re not looking.” It’s a great analogy for some of the more...

Ransomware: What You Need to Know Now

Ransomware: What You Need to Know Now

Ransomware: What you need to know now!  Get Beyond Malware Attacks The internet is an amazing, useful and often wonderful thing. It’s also a giant mess. For every resource it gives your business that helps you succeed, it also offers a threat. Not-safe-for-work...

Adding an Air Gap to the 3-2-1 Backup Rule

Adding an Air Gap to the 3-2-1 Backup Rule

It’s not a matter of IF your business will succumb to hackers, a natural disaster, employee theft or other mismanagement of data. It’s a matter of WHEN. Naturally, it’s become common practice to keep safe backups of anything business essential, but how companies keep those backups varies considerably.

The Case for Office 365 Backup

The Case for Office 365 Backup

In the wake of Microsoft's September 4 - September 5 South Central U. S. outage for Office 365 and Azure, it's worth asking, should you be concerned with backup of your Office 365 data? It's your data, and while Microsoft normally does a good job with protecting it,...

The worst cyber security breaches of 2018 – Under Armour

The worst cyber security breaches of 2018 – Under Armour

Fitness apparel manufacturer Under Armour gave us a good example of how companies can try to protect their user’s data but often fail to fully cover everything that needs protecting. The information that was stolen from Under Armour is minor compared to some of the...

Worst Cybersecurity Breaches – VPNFilter

Worst Cybersecurity Breaches – VPNFilter

VPNFilter More and more, our business environments are connected to the cloud. The transmission of data and the speed to which it can be accessed is critical to business intelligence and competitive advantage. When that data becomes attractive to hackers, the...

The Cyber Kill Chain

The Cyber Kill Chain

What is the cyber kill chain? Lockheed Martin, known for defense and security technologies, among other things, has developed a new “kill chain” method of describing each stage of a cyber attack. Although cyber-attack chains may take different forms, these steps...

Ransomware Attack in Atlanta

Ransomware Attack in Atlanta

The recent cyber attack on the municipal systems at the city of Atlanta shows the vulnerability of city governments

In the Mind of the Hacker

In the Mind of the Hacker

It’s impossible to put a number on how many “hackers” there are in the world, but the FBI has a list of their most wanted cyber criminals.