fbpx

MSPs: How Are Your Clients Backing Up Their Virtual Machines?

Virtualization and cloud computing is becoming more and more popular among smaller corporations. The implementation of these tactics may leave a company exposed without a proper backup plan. It is important to not just back up the data being processed by virtual machines, but also to back up the virtual machines themselves. Virtual machines (VMs) […]

MSPs: How Are Your Clients Backing Up Their Virtual Machines? Read More »

What is a Blended Attack?

Blended attacks combine multiple threats into a single attack to leave a networked computer completely compromised. Normal cyber attacks tend to have only one attack vector, but blended attacks will use multi-pronged strikes to exploit any vulnerabilities. Security and IT personnel have a difficult time trying to deal with a blended attack as they hit

What is a Blended Attack? Read More »

A man uses his phone while working on his laptop.

Do you have Backup and Recovery for Your Mobile?

Laptops, tablets, smartphones and any other mobile devices make everything possible from reading the news to working online while traveling. Thanks to smartphone technology, it has become easy for business people to work on the go, keep up to date with business affairs and access sensitive data no matter their location. Although highly beneficial for

Do you have Backup and Recovery for Your Mobile? Read More »

4 Things to Avoid in Data Recovery

Knowing what not to do when creating and implementing your data recovery plan is just as important as knowing how to put together and maintain a correct and reliable procedure. Here is what to avoid when working with data recovery:   What to Avoid in Data Recovery   1. Don’t Underestimate Your Infrastructure Many organizations

4 Things to Avoid in Data Recovery Read More »

2018’s Most Common Cyber Attacks

With the year drawing to a close and the holidays fast approaching, we take time to look back at the cyber attacks that dominated the world of cyber crime in 2018. By understanding the main tactics used by cyber criminals this year, we can predict and become more prepared for next year’s threats.   5

2018’s Most Common Cyber Attacks Read More »

Deduplication: pros, cons, what to look for and what to expect from it.

  We will not try to get down to the molecular level. The main intention of this article is to shed some light on deduplication-relevant pros and cons and to broaden view of this topic. In computing, the simplest and the most effective definition (by Wikipedia) of Data Deduplication goes as “a specialized data compression

Deduplication: pros, cons, what to look for and what to expect from it. Read More »

Scada BDR

ActiveImage in SCADA environment

SCADA (Supervisory Control And Data Acquisition) Systems control the automation in many industries such as Power, Water, Manufacturing, Energy, Mass Transit and more. SCADA systems are computer based, and so even the best system will fail at some point for reasons such as: Hardware Failures (disk failure, power surges, aged equipment, etc). Software Failures (viruses,

ActiveImage in SCADA environment Read More »

Everything You Need To Know About The Pen Test

Although you may have implemented the best cyber-crime defenses and have a great IT team, there can still be holes in the infrastructure that cyber-criminals can manipulate to get access to your valuable data. This is why businesses run a penetration (pen) test.   What is a Pen Test?   It is a test to

Everything You Need To Know About The Pen Test Read More »

3 Basics Ways to Protect Your Small Business From Phishing

Phishing uses social engineering techniques in an attempt to convince a user to give up their private information. They gain access to usernames, passwords, credit card number and other sensitive information. Cybercriminals will pose as a legitimate person or company. Email may include links to a real website. These websites, companies and individuals are fake

3 Basics Ways to Protect Your Small Business From Phishing Read More »

Scroll to Top