Data Backup

The Cyber Kill Chain

The Cyber Kill Chain

What is the cyber kill chain? Lockheed Martin, known for defense and security technologies, among other things, has developed a new “kill chain” method of describing each stage of a cyber attack. Although cyber-attack chains may take different forms, these steps...

Ransomware Attack in Atlanta

Ransomware Attack in Atlanta

The recent cyber attack on the municipal systems at the city of Atlanta shows the vulnerability of city governments

In the Mind of the Hacker

In the Mind of the Hacker

It’s impossible to put a number on how many “hackers” there are in the world, but the FBI has a list of their most wanted cyber criminals.

IRS Warning about CPA Firm Data Loss

IRS Warning about CPA Firm Data Loss

No one likes a warning from the IRS, but CPA firms are taking heed of the most recent message from the stalwart government agency: “Step Up” security for the mountains of sensitive information you obtain each year. CPA firms regularly keep digital files of names,...

Don’t Let the Reaper Get Your Data

Don’t Let the Reaper Get Your Data

According to an article in the Wall Street Journal concerns are escalating over one of North Korea’s three major hacking organizations because of both their adeptness and sheer brazenness. APT37 aka “Reaper,” is a hacking group best known for attacking South Korea but...

NEW Backup for Microsoft Office 365

NEW Backup for Microsoft Office 365

Office 365 Backup Whether you have completely migrated to Office 365, or have a hybrid Exchange and Office 365 deployment, your business objectives remain the same. You must remain in control of your data and you need Office 365 backup and recovery at your fingertips....

Cry Me a River…Really?

Cry Me a River…Really?

Yep. That's one headline I saw this weekend about the WannaCry attack. And I guess we can understand that sentiment, maybe. Our view at Global Data Vault, is our job is to be ready to help any of our customers hit by this outrageous attack. Our customers use our...

Bandwidth – How Much is Enough?

Bandwidth – How Much is Enough?

How Much Bandwidth is Enough? Knowing and planning for an appropriate level of bandwidth is a key component of every DRaaS solution. In our most common DRaaS implementation, the data is moved from local repositories at the customer site over the internet or WAN to our...

Sizing for Local Backup Repositories

Sizing for Local Backup Repositories

Sizing for Local Backup RepositoriesProper sizing for local backup repositories is a critical step in building a complete backup and disaster recovery as a service solution (DRaaS). Below, we will list the most accurate way of determining what your data change rate is...

Trends in Data Density

Trends in Data Density

Advances in Data Density A recent article in the Economist, Atoms and the voids, tells of a data storage breakthrough where individual chlorine atoms were arranged on a sheet of copper to form the code of zeros and ones used in typical binary storage. While the...

What is Veeam Backup

What is Veeam Backup

Backup and recovery solutions are vital to your organization, but backup solutions that used to work effectively may no longer do the trick in today’s ever-changing computing landscape, especially if your firm relies heavily on virtualization. Veeam backup offers...

How to Destroy a Hard Drive

How to Destroy a Hard Drive

How to Destroy a Hard Drive When replacing an older desktop, you may have reservations about just chucking it into the bin. You’ll need to be certain that you’ve erased all the information contained on your computer’s hard drive. This task can be tougher than you...

Ready for the Windows Server 2003 Deadline?

Ready for the Windows Server 2003 Deadline?

July 14 marks the end of an era, and your business could face disaster if you’re not properly prepared. The era to which we’re referring is the end of service and support for Windows Server 2003, a server platform heading out to pasture in 2015. Proper preparation...

Why Five 9s Means You’ve Made It

Why Five 9s Means You’ve Made It

A Cloud Server Uptime Full House! Some people may say they’ve made it once they nab a six-figure income or four-car garage. Others might measure success by the quality of their friendships, or the fact that their name showed up as a "Jeopardy!" question. While the...

Restore Point Console

Restore Point Console

Global Data Vault’s Cloud Disaster Recovery Restore Point Console Our web based portal shows your data protection status with drill downs to the available restore points. The restore point console runs on any browser and is tablet/mobile compatible. What's Shown Here:...

The History of Data Vaults

The History of Data Vaults

Vaults through the Ages The Evolution of Vaults Vaults are lockable enclosures that protect valuables against damage, theft or intrusion. In the history of data vaults, the first two thousand years saw vaults that were more intimidating than protective. They were...

Heartbleed’s impact at GDV

Heartbleed’s impact at GDV

The OpenSSL Heartbleed bug threatened the security of data across the internet. This vulnerability affected anyone who visited a compromised website and put them at an increased risk for identity theft, credit card theft, and hacking. While this security threat was...

Welcome to Wireless Mesh Networking

Welcome to Wireless Mesh Networking

This could be a communications game changer. Imagine being able to access the internet and make cell phone calls where there is no WiFi or cell tower such as in remote search-and-rescue areas or disaster areas where cell towers have been destroyed. Imagine government...

Veeam Cloud Provider

Veeam Cloud Provider

The Veeam Cloud Provider program provides a marketplace for VMware and Hyper-V users to find a cloud provider to receive and store Veeam backups in the cloud. Global Data Vault is excited to be a member of this very select program sponsored by Veeam. Veeam hosts a...