Cybersecurity

The Silent Cyber War

The Silent Cyber War

Overview The silent cyber war has begun. Instead of battle lines being drawn in faraway lands, a silent war is being waged in cyber space every day. According to Dee Smith, CEO of Strategic Insight Group, we are in a new frontier in cyber warfare. This is not just...

Cry Me a River…Really?

Cry Me a River…Really?

Yep. That's one headline I saw this weekend about the WannaCry attack. And I guess we can understand that sentiment, maybe. Our view at Global Data Vault, is our job is to be ready to help any of our customers hit by this outrageous attack. Our customers use our...

Ready for the Windows Server 2003 Deadline?

Ready for the Windows Server 2003 Deadline?

July 14 marks the end of an era, and your business could face disaster if you’re not properly prepared. The era to which we’re referring is the end of service and support for Windows Server 2003, a server platform heading out to pasture in 2015. Proper preparation...

The History of Data Vaults

The History of Data Vaults

Vaults through the Ages The Evolution of Vaults Vaults are lockable enclosures that protect valuables against damage, theft or intrusion. In the history of data vaults, the first two thousand years saw vaults that were more intimidating than protective. They were...

Heartbleed’s impact at GDV

Heartbleed’s impact at GDV

The OpenSSL Heartbleed bug threatened the security of data across the internet. This vulnerability affected anyone who visited a compromised website and put them at an increased risk for identity theft, credit card theft, and hacking. While this security threat was...

Information Destruction Through History

Information Destruction Through History

Loss of Knowledge Information the most valuable commodity in the world. All human progress depends on the accumulation and preservation of information. When information is lost, human progress suffers. This infographic displays some of the most significant losses of...

Internet Pirates

Internet Pirates

Internet Pirates There are two new nasty computer malware and ransomware strains currently terrorizing both PC’s and Mac’s. They have gained momentum since their first reports early this year. Both are prolific, becoming more sophisticated in their delivery, and...

Data Protection Audit Planning

Data Protection Audit Planning

In part one of “How to plan and execute a data protection audit,” we discussed the importance of user participation in the design process of your data audit plan. In this installment, we go into more detail about the questions you need to ask about your business...

How to Plan and Execute a Data Protection Audit

How to Plan and Execute a Data Protection Audit

Embrace the Audit The word “audit” strikes fear in the hearts of most business owners, but a pre-emptive data protection audit should actually be embraced. Taking stock of your data and the many scenarios which could impact its continuity is vital to the livelihood of...