[vc_row][vc_column][vc_column_text] SMBs need to take cyber security more seriously, study shows According to a new study, a large proportion of small business owners in the United States are laboring under a misapprehension regarding the true state of cyber security....
Data Backup
Why a Firewall Isn’t Enough Anymore
Antimalware efforts: the importance of early detection Small- and medium-sized businesses utilize a variety of methods to promote computer protection. From firewalls to carefully assigning permissions only to users who actually need them, data loss prevention usually...
Antivirus and antimalware: the importance of a company-wide strategy
Admin Rights Can BackFire on You! Many employees who use computers routinely as a part of their daily workflow prefer to have administrator privileges over their machines so that they can install software as needed without having to wait for an IT department to...
Data Security MUST Include Regular Backup
The importance of regular data backup A robust data security policy must address several issues related to server and data backup. One of the most important involves the frequency of backups. It is in the company's best interests to be sure that in the event of an...
Symantec Issues Data Security warning about Shamoon Malware
Another malware wreaking havoc on company networks Symantec is currently warning computer users that a new variation of the Shamoon malware has been detected. This most recent variant performs several different actions on infected systems. In addition to wiping data...
Just When You Thought Your Data Protection was Strong Enough…
[vc_row][vc_column][vc_column_text] How Hackers Erased a Digital Life in an Hour... When tech writer Mat Honan of Gadget Lab, a regular to the Wired blog, lost all of his digital life in the span of an hour, it should be a wake up call to everyone to increase their...
Understanding the Effects of Malware on Data Protection
[vc_row][vc_column][vc_column_text] Understanding the Impact of Malware The term “malware” is a shortcut way of referring to malicious software installed on a system without the owner's permission or knowledge. Malware tends to produce two major effects, both of them...
Download the Buyer’s Guide to Virtual & Physical Data Protection
This new eBook, courtesy of Dell AppAssure, will help you sort through the new as well as the more traditional data protection approaches, providing the background you need to select the right approach for your environment. About the Author: Greg Shields Microsoft...
A Guide to Malicious Software and Their Threat to Data Security
[vc_row][vc_column][vc_column_text] A Basic Understanding of Viruses Trojans, and Worms Most small business owners have probably seen news reporting on viruses, worms, and Trojans, but they may not have a terribly clear understanding of how these forms of malware...
AppAssure Data Backup Video: Recovery via Remote Mount of SQL Data
[vc_row][vc_column][vc_column_text] AppAssure Data Backup Software Video Series: Recovery via Remote Mount of SQL Data AppAssure Product Demo Ever have a large database restore to recover a table, a couple of rows or some subset of data only to find out you don’t have...