Back to Blog
What Can Ransomware Infect?
Did you know that ransomware does not only infect your desktop and any drives you have attached to it, but it can also infect your cloud storage. This has not been reported on as often, but it has happened and will continue to evolve and infect more and more platforms. With this in mind, you need to make sure your backups are being done in such a way that they can detect ransomware. If you are backing up to the cloud you need to ensure that it is as secure as possible to help combat against infection.
Another problem companies are facing is their backups are backing up an infection, which can prevent backed up data from being recovered. This is why it is important to keep multiple instances of your backups. Some backup solutions have begun to build in notification measures to let you know if it detects an abnormal amount of changed files so that you do not overwrite your offsite backups with corruption.
If you would like to learn more about backup solutions we offer to help keep your backups as secure and reliable as possible.
Back to Blog
How Good is Your Disaster Recovery Plan?
Since hurricane Michael has been in the news with its mass devastation and it being Cyber Security month, we thought it would be good to review what a good Disaster Recovery Plan looks like.
It really doesn’t matter what size your company is or whether your data is in the cloud or on-premises, every company should have a detailed disaster recovery plan with step-by-step instructions on how to do the recovery.
This plan should include: what will need to be recovered, detailed steps on how to do the recovery for each device, contact information, device specifications, where to acquire the new equipment and the order of importance if you are recovering multiple devices at once.
Reach out if you would like to learn more or need help setting up your Disaster Recovery Plan.
Back to Blog
The Importance of Cybersecurity
Cybersecurity is the protection of internet connected systems from security threats. There are many layers to cybersecurity and companies should make sure they are doing all they can to protect themselves in each category.
Listed below are several of the categories, definitions and remediations to consider:
Back to Blog
Keeping hardware and software up-to-date
While everyone likes to get as much life as they can out of equipment it is also important to think about other key factors. Equipment and application vendors provide an end of life date at which time they quit supporting equipment and quit providing security updates. In today’s world, it is more important than ever to make sure you have systems that are being continually updated. People with malicious intent, are constantly trying to find the easiest ways into systems and often that is through systems which are no longer being updated or patched.
Productivity can greatly be affected by out-of-date equipment. Faster equipment and more efficient applications are constantly being released. By keeping these up-to-date, your employees will have the ability to be more productive. Aging computers get bogged down with miscellaneous applications that over time, slow down your computer systems.
Lastly, if you wait too long to upgrade the combination of equipment and applications, you can find the process very painful. You will find that when you get that new operating system and try to run applications that are 10-15 years old, they no longer work or certain features no longer work. By keeping both equipment and applications up-to-date together, you will find everything runs smoothly and your employees are not getting frustrated due to poor performance of aging equipment.