Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Disaster Recovery

Using DR to Protect Against Ransomware

by Michael Otey

While 2020 will surely be remembered as the year of the pandemic, it’s quite possible that 2021 will be remembered as the year of ransomware too. Ransomware attacks seem to be running amok through 2021 and almost daily occurrences have been reported. Ransomware is a type of malware that blocks access to a company’s files… Read More

Disaster Recovery and the SolarWinds Exploit

by Michael Otey

One of the biggest malware attacks in recent history was the SolarWinds exploit where malware was spread through SolarWinds’ software update process to thousands of government and private sector customers. SolarWinds is a well-known provider of IT management products and their Orion infrastructure monitoring and management platform was the product that was attacked. Automatic updates… Read More

Four Common Disaster Recovery Myths

by Michael Otey

Most organizations have finally been convinced about the need to have a robust disaster recovery (DR) plan to protect their essential workloads. That’s due in a big part to the fact that almost everyone in IT is all too familiar with Murphy’s Law that states if something can go wrong it will go wrong and… Read More

The Importance of Endpoint Backup

with 1 Comment by Michael Otey

While almost every business has some type of backup processes in place for their important servers, many of these same companies have neglected endpoint backup. There’s no doubt that servers are more important as they provide a platform for the business-critical applications and services that the business relies on but they are not the only critical component.

The Benefits of DRaaS for the SMB

with 2 Comments by Michael Otey

While definitely necessary, making and maintaining disaster recovery (DR) plans is definitely not one of the favorite tasks for IT personnel. DR planning is complex, time-consuming, and it involves the resources of a number of both IT and non-IT related personnel. In addition, implementing DR plans isn’t cheap.

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: