Data Backup

What is an RTO? RPO?

What is an RTO? RPO?

These are concepts of recovery time objectives (RTO) and recovery point objectives (RPO) defining the acceptable amount of time it takes to recover system operations …

Preparing your business for hurricane season

Preparing your business for hurricane season

Hurricane season is here. Are you prepared? In the United States, June 1st marks the beginning of hurricane season. With everything else 2020 has given us, we hoped for a reprieve from at least one bad thing this year, however NOAA is...

Next Level Backup Protection

Next Level Backup Protection

Next Level Backup Protection Physical and logical security are two important factors when considering backup files. Modern restore capabilities allow for entire virtual machines and systems to be brought back online from a backup very quickly,...

Phishing for Your Network Access

Phishing for Your Network Access

Right now, the most popular phishing email subject line is “COVID-19 payment.” Why would your employees NOT click on that? What can you do?

Hackers Use Coronavirus to Exploit Human Nature

Hackers Use Coronavirus to Exploit Human Nature

Hackers are using coronavirus to exploit people’s desire to investigate the worrisome nature of this new threat by burying malicious code in seemingly harmless Covid-19 incidence maps.

Cloud Mobility – Buzz Words or Pain Point?

Cloud Mobility – Buzz Words or Pain Point?

Cloud Mobility – Buzz Words or Pain Point?Do an internet search on “cloud mobility,” and you will get a TON of results.  The definition(s) can be confusing, but basically it describes the ability to avoid locking in workloads to a specific cloud vendor. ...

The Air Gap Controversy

The Air Gap Controversy

The Air Gap Controversy In a previous blog post, we talked about the 3-2-1-1 data protection concept as well as “air gaps.” We’ve also discovered that viruses can corrupt files that are written to air-gapped technologies, such as tape, rendering them useless, and the...

How to keep Ryuk ransomware from interrupting your business

How to keep Ryuk ransomware from interrupting your business

Prevent RYUK ransomware from interrupting your businessOctober is National Cybersecurity Awareness Month and, according to TechNewsWorld.com, in an article published in  October 2019, “the global damage from ransomware could cost US$11.5 billion this year […] while...

What is Global Data Vault’s Enhanced Data Protection?

What is Global Data Vault’s Enhanced Data Protection?

What is Enhanced Data Protection?In Veeam Backup and Replication 9.5 Update 3, Veeam introduced a feature called “Insider Protection,” and updated it for the most recent release of Update 4. Insider Protection is a method used to combat the malicious or intentional...

Hackers Attacking International Suppliers

Hackers Attacking International Suppliers

Hackers Attacking International SuppliersCybercrime exploiting vulnerabilities in international supplier's networks There’s a saying, “Make sure everybody in your boat is rowing and not drilling holes when you’re not looking.” It’s a great analogy for some of the more...

Ransomware: What You Need to Know Now

Ransomware: What You Need to Know Now

Ransomware: What you need to know now!  Get Beyond Malware Attacks The internet is an amazing, useful and often wonderful thing. It’s also a giant mess. For every resource it gives your business that helps you succeed, it also offers a threat. Not-safe-for-work...

Adding an Air Gap to the 3-2-1 Backup Rule

Adding an Air Gap to the 3-2-1 Backup Rule

It’s not a matter of IF your business will succumb to hackers, a natural disaster, employee theft or other mismanagement of data. It’s a matter of WHEN. Naturally, it’s become common practice to keep safe backups of anything business essential, but how companies keep those backups varies considerably.

The Case for Office 365 Backup

The Case for Office 365 Backup

In the wake of Microsoft's September 4 - September 5 South Central U. S. outage for Office 365 and Azure, it's worth asking, should you be concerned with backup of your Office 365 data? It's your data, and while Microsoft normally does a good job with protecting it,...

The worst cyber security breaches of 2018 – Under Armour

The worst cyber security breaches of 2018 – Under Armour

Fitness apparel manufacturer Under Armour gave us a good example of how companies can try to protect their user’s data but often fail to fully cover everything that needs protecting. The information that was stolen from Under Armour is minor compared to some of the...

Worst Cybersecurity Breaches – VPNFilter

Worst Cybersecurity Breaches – VPNFilter

VPNFilter More and more, our business environments are connected to the cloud. The transmission of data and the speed to which it can be accessed is critical to business intelligence and competitive advantage. When that data becomes attractive to hackers, the...