[vc_row][vc_column][vc_column_text] Cloud backup adoption in today's regulatory environment In the 21st century marketplace, information is the lifeblood of a growing number of businesses both large and small. Although this has made the need for adequate data backup...
Disaster Recovery
Free eBook Explains the Key Elements of Disaster Recovery
Why you should update your data recovery plans Organizations have had decades of experience in planning for disaster recovery. • We know where the tapes are kept. • We have spare server hardware on hand. • We’ve protected installation media in a fire safe. • We have...
Beware: “Changeup” Malware Threatening Data Security
[vc_row][vc_column][vc_column_text] "Changeup" Worm infecting SMB's and large businesses worldwide Few businesses want worms invading the premises, but night crawlers are probably preferable to what office supply retailer Staples has had to contend with during the...
IT Security Guest Blog: What the Government Needs vs. How the Government Thinks
[vc_row][vc_column][vc_column_text] M. Ursula Herrmann is Great Lakes Computer's guest blogger on Government IT Security. You may also recognize her from her work on Crain's Cleveland Business as a guest blogger on Network Security. Ms. Herrmann is a Network...
Government Data Security Organization Hacked
[vc_row][vc_column][vc_column_text] Irony of ironies: anti-hacking website hacked As anyone in business likely knows, government websites are far from ideal, often making it difficult to find information that should be readily available. The federal government's...
Best practices for network security and server backup
[vc_row][vc_column][vc_column_text] Network server backup for complicated, special cases Backing up the servers on a network is most often a straightforward process, particularly if the SMB involved has invested in a high-quality network server backup software suite. ...
50 Million Evernote Users Effected by Huge Data Security Hacking
[vc_row][vc_column][vc_column_text] Fifty million users should pay close attention to data loss prevention In one of the most extensive hacking events in recent years, an estimated 50 million individuals are being urged to reset their passwords on the Evernote...
Hacking of Federal Reserve Heightens Emphasis on Data Protection
[vc_row][vc_column][vc_column_text] Attack by "Anonymous" of Federal Reserve provides key lesson in data protection Businesses, both large and small, need to sit up and take notice: none other than the Federal Reserve system of the United States has admitted that its...
New Computer Repair Video Shows Steps to Take When Hit with a Virus
Great Lakes Computer's new video shows you steps to take should you contract a computer virus Should I close my browser right away if I get a virus? Should I click on any of the pop-ups prompting me to run a virus scan? Why does my browser keep taking me to sites that...
IT Security Guest Blog “Continuous Monitoring: You’re Doing It Wrong”
Great Lakes Computer would like to welcome M. Ursula Herrmann as our new guest blogger on Government IT Security. You may recognize her from her work on Crain's Cleveland Business as a guest blogger on Network Security. Ms. Herrmann is a Network Security...