Archive for the ‘Data Security’ Category

Tony Howlett
By:


Date:
May 31, 2017
It isn’t bad enough that the WannaCry ransomware is sweeping the globe, with even more dangerous variants  going after your servers. Now some forms of malware attempt to infect your backups. Unsuspecting IT managers will assume they can recover from a ransomware infection by restoring their backups, only to find those copies are infected as well. The Slow Burn Some versions of  malware will wait 16 or even 32 days to launch once they’ve infected a host, knowing most IT departments only keep two to four… Read More
Tony Howlett
By:


Date:
Mar 15, 2017
Compliance Regulations for Data Nowadays online backup has become in vogue thanks to a combination of faster, cheaper bandwidth and the increased need for off-site backups. In fact, in many ways online backups have greatly improved the practice of disaster recovery. However, if your company is one that falls under any regulation or standards body, it could bring as many pitfalls as solutions. If you accept or store any kind of financial, health or personal information,  you probably fall under some local, state or federal regulation  And its possible… Read More
By:


Date:
Jan 12, 2017
There are many discussions in recent events regarding the threat of vulnerable IoT devices. Part of the scare here is the ability of nefarious actors to unleash these devices in controlled botnets in strategic Denial of Service attacks. This is a very tangible threat that has manifested in a number of recent attacks including a massive DNS outage leveraged against DYN several weeks ago. The truth of the matter is that the threat from IoT and industrial devices is not really new, it just seems… Read More
By:


Date:
Aug 18, 2016
Every day, small businesses lose data on dedicated and cloud servers for a number of reasons, but the most incidents occur due to no data security. With the available technology options and services of today, those are unnecessary risks. These scenarios can affect a company strategically, financially, and even legally.  Minimizing risk is one reason why hosting and cloud computing services provide big advantages for small businesses. These services offer entrepreneurs cutting technology and capabilities that can be completely customized without a large up-front investment.… Read More
By:


Date:
Aug 11, 2016
More than ever, modern technologies are a critical part of the world around us. Integrated into business, entertainment,health and countless other applications, anything that impacts the availability of technology services can affect work productivity, affect the bottom line, affect health, or cause major inconveniences. When it comes to business, there is little doubt that the result of a system downtime can be measured in terms of lost opportunity, lost revenue, lost reputation, and lost productivity. Those are the reasons why we talk about High Availability… Read More
By:


Date:
Aug 9, 2016
Computer infrastructure is the backbone for companies across the land. Continuity is a must, therefore the efforts to avoid downtime and data loss is the substance of every systems administrator. Getting to launch an application and rapid time to deployment are often primary points focus in IT initiatives - for a variety of good reasons. However necessary these tasks are, if server security is not a component of this initial infrastructure effort, there are likely to be risk and implications at some point in the… Read More