Blog Archives

Ransomware Protection Requires Different Protocols

The core server component of most modern backup applications run on Windows. Unfortunately, Windows is also the primary target of ransomware attacks. While there are incidents of attacks on Linux or Macs, ransomware creators are going to go for the

Tagged with: , , , , , , , ,
Posted in Blog

What Should MSPs Do After Backup?

Managed service providers are invaluable leading organizations to the cloud. But most excel in one area; backup. Some MSPs are adding disaster recovery as a service (DRaaS). But there are two other areas where data centers (potential customers) continue to

Tagged with: , , , , , ,
Posted in Blog

How To Design a Hyper-V Disaster Recovery Plan

Server Failure, Storage System Failure and Data Center Failure are all forms of disaster that will impact the Hyper-V environment. Now IT planners should add ransomware to that list. How does the Hyper-V Administrator design a disaster recovery plan? Disaster

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Why is Operational Recovery Needed?

The reason backup strategies exist is to ensure operational continuity after someone makes a mistake, purposefully corrupts data, or hardware or software component runs afoul. Operational recovery is the day-to-day reason you backup data. It is the recovery of specific

Tagged with: , , , , , ,
Posted in Blog

Scale out NAS Needs a New Kind of Performance

Scale out NAS has proven the old adage that in IT we never solve any problems; we just move them around. Scale out systems were built for a lot of reasons, and one of the chief reasons was performance; a

Tagged with: , , , , , ,
Posted in Blog

How to Prepare for the Next WannaCry

WannaCry was a wakeup call. New ransomware strains are now appearing every week because ransomware is a profitable “business.” There will be another attack and the chances of your organization being infected are high. The time is now to take

Tagged with: , , , , , , , ,
Posted in Blog

Testing is the Key to Ransomware Success

IT’s goal should be to never pay a ransom as a result of a ransomware attack. To achieve that goal requires prevention, preparation and practice. Unfortunately, practice is the element most overlooked but potentially the most critical. Why Ransomware Testing

Tagged with: , , , , , ,
Posted in Blog

How to Make DR Testing Less Painful

While every IT professional will admit that it is important, disaster recovery testing generally falls to the bottom of the IT to do list, right after root canal. But if testing is not a key component, the process of creating

Tagged with: , , , , , , , , ,
Posted in Blog

Why Do All-Flash Arrays Need QoS?

If all-flash arrays provide instant, unlimited performance, why manage how much of that performance they deliver through techniques like quality of service (QoS)? For most organizations one of the attractions to all-flash arrays is the set and forget answer to

Tagged with: , , , , , , , , , , ,
Posted in Blog