Search Results

Searching for: "ransomware"

The End of VMware Perpetual Licensing Is Upon Us

Well, friends and casual passers-by, the day has come, and unfortunately, our Mirazon crystal ball was right: The End Of VMware Perpetual Licensing May Be On The Horizon. VMware perpetual licensing is …

Read More

Defense In Depth – Safeguarding Your Business With Email Security

Our previous Defense In Depth blog covered next-generation firewalls (NGFW). The next layer in our Layered Security Strategy is all about email security and how it plays a vital role in your business’s overall …

Read More

The Reality of Cybersecurity Vulnerabilities, Threats, & Risks

If we’ve heard it once, we’ve heard it dozens of times. There are countless aspects to consider in cybersecurity, and as technology continues to advance at a rapid pace, so …

Read More

Defense In Depth – The Importance of Endpoint Protection & Security

In today’s digital age, the security of your endpoints (i.e., laptops, tablets, smartphones, etc.) has become more critical than ever. With the rise of remote work and BYOD policies, the attack surface …

Read More

The Realities of Cloud Immutability

In previous posts, we’ve set up that the world is scary, and we don’t want to rotate hard drives or tapes, and we want immutability. So, let’s talk about cloud immutability, what we …

Read More

A Modern IT Environment With Immutable Storage

The Modern IT Environment PART 1 The modern IT environment is terrifying. There’s no other way to put it. It used to be that all you had to do was …

Read More

Immutable Backups and Object First

With vulnerabilities and zero-day exploits, we’re playing a game of Whack-a-Mole that has no end in sight. It’s time we accept that, at least for the foreseeable future, this will …

Read More

The Top 5 Biggest IT Concerns

The IT industry is accustomed to last-minute, hasty changes. New technologies are released, old ones evolve, company requirements are constantly changing, and employees come and go. All that put together …

Read More

The Countdown Has Begun For Your Old PC

Take a good look at the computers you use every day. Do you know what operating system you’re running and what hardware is inside? If you have no idea, do …

Read More

Social Engineering and Human Hacking

While the term “social engineering” may not sound very threatening, this type of cyberattack is wreaking havoc on any and every exploitation they come across. The main difference between this …

Read More

fITness Challenge: Reviewing Security Posture

We’re in week three of our fITness challenge! If you missed last week’s challenge, you can catch up here. Week 3: Review Security Posture After checking and testing your backups, …

Read More

New Features in Veeam V11

As we’ve said many times before, we love Veeam because they always iterate and improve their product with extremely useful features and updates, and it’s clear they listen to their …

Read More

Press enter to search