Disaster Recovery

What is the Cloud? And Where is it?

What is the Cloud? And Where is it?

There has been a ton of talk about the cloud. Cloud this, cloud that. But what actually Is the cloud? It’s okay if you don’t know, most people don’t understand it and even some tech people tend to wave their hands towards the sky when trying to explain it!

Petya Ransomware: Is your data at risk?

Petya Ransomware: Is your data at risk?

A new ransomware named Petya hit high-profile targets in multiple countries, including the United States, on Tuesday. Tens of thousands of infections have been reported globally, just one month after the WanaCry outbreak.

WannaCry Ransomware: Is Your Business At Risk?

WannaCry Ransomware: Is Your Business At Risk?

You’d be hard-pressed to miss last week’s biggest headline, the WannaCry cyber-attack sent shockwaves around the globe. Businesses of all sizes and even police departments found themselves crippled without warning. 

Why System Updates Are Important!

Why System Updates Are Important!

A MASSIVE RANSOMWARE attack spread across the globe early Friday morning, locking up thousands of hospital, telecommunications, and utilities systems in nearly 100 countries. The attack used data stolen from the NSA to exploit vulnerabilities in Microsoft Windows and deliver the WanaCrypt0r ransomware. The demand was for $300 per PC. 

Spring Clean your PC, Remove & Prevent Malware

Spring Clean your PC, Remove & Prevent Malware

Cyber criminals frequently and automatically scan websites and PCs with different types of malware, to see if there are vulnerabilities they can use to gain entry to your system. Outdated programs provide these cyber criminals with an easy path to your computer.

5 Ways to Protect Your Data in the Cloud

5 Ways to Protect Your Data in the Cloud

Cloud computing is now the norm — 95 percent of businesses worldwide are using at least one cloud service, according to a 2016 study. While there are many services that fall under cloud computing, businesses often use the cloud to store data.

Understanding Cloud Technology

Understanding Cloud Technology

The cloud is virtual and therefore does not require any hardware of your own to deliver a service. Cloud technology can deliver that service to you, without having to install anything or have it on a server at your business.

Cloud Hosting vs. File Servers: A Pros and Cons Analysis

Cloud Hosting vs. File Servers: A Pros and Cons Analysis

With cloud computing well into the mainstream and steadily replacing roles currently filled by traditional server architecture, it's time to ask the big question: can cloud hosting replace traditional file servers for storing and sharing files between employees in your organization? 

Crysis Ransomware Infects Windows, Mac, and VMware Machines

Crysis Ransomware Infects Windows, Mac, and VMware Machines

The Crysis ransomware is quickly yet quietly spreading to businesses across the globe. Even though it is more common and destructive than the Locky ransomware, Crysis has not received nearly as much press attention.

How to Protect Your Business from Ransomware Attacks

How to Protect Your Business from Ransomware Attacks

The number of ransomware attacks is increasing at an alarming rate, making ransomware the biggest cyber threat that businesses are facing today. To see this disturbing trend, you only have to turn back the clock to the beginning of 2016.

How to secure your laptop fleet

How to secure your laptop fleet

When the corporate network proves difficult to penetrate, hackers start looking for softer targets. This can include laptops your employees use to access the work network.

BACK UP DON'T PAY UP!

BACK UP DON'T PAY UP!

When it comes to ransomware, it’s not the ransom that’s so damaging to your business. It’s the downtime.  Just ask the folks at Hollywood Presbyterian Medical Center.

Ransomware spreads via removable drives

Ransomware spreads via removable drives

Zcryptor is a new type of ransomware that unlike it's predecessors exhibits worm-like behavior. This ransomware leverages removable and network drives to propagate itself and affect more users.

How to Protect Your Business from the Locky Ransomware

How to Protect Your Business from the Locky Ransomware

As TrendMicro predicted, hackers are increasingly using ransomware to encrypt businesses' files and hold them for ransom. As a result, headlines about these attacks abound in print and electronic media, making them seem almost routine.  In 2016 there have been over 40 new families of crypto ransomware discovered.

6 Reasons to Use Remote Monitoring to Keep an Eye on Your Systems

6 Reasons to Use Remote Monitoring to Keep an Eye on Your Systems

Many IT service providers use remote monitoring tools to gather information and send reports about their clients' computer systems. Almost anything can be monitored, from routers and firewalls to virus detection and email services.

Hospital Pays Hackers a Ransom to Regain Control of Its Computers

Hospital Pays Hackers a Ransom to Regain Control of Its Computers

February 5, 2016, started out like any other day for the doctors, nurses, and other staff members at the Hollywood Presbyterian Medical Center in Los Angeles, California. But by the end of the day, many of them could no longer access or update patients' medical records. Nor could they send or receive emails. When the hospital's IT department investigated, it found that the computer systems were infected with ransomware.

Cloud or dedicated server? Where is the smart money going?

Cloud or dedicated server? Where is the smart money going?

Should you be entrusting your data to the cloud or keeping it down to earth on your own servers? This is a decision facing every CIO. And it’s one they’ll be forced to justify and revisit regularly for the foreseeable future. That’s because there’s been no knock-out blow in the argument between the cloud and the in-house server. There’s plenty to be said for both, which makes the question one of what’s right for you.