Blog

What happens if my IT provider loses my data?

Insurance in the 21st century has become ubiquitous. Whether it’s for your car, house, or even a body part, there is nothing left which can’t be covered by insurance companies. In many instances, it appears to be unnecessary overkill lining the pockets of in-case-stuff-happens conglomerates. However, there are a number of situations where insurance can be the difference between losing everything and maintaining the [...]

By |2017-08-14T19:20:20-04:00August 14th, 2017|Blog|Comments Off on What happens if my IT provider loses my data?

Why cyber security is so difficult.

The world is undergoing major changes, many of them because of advances in technology. Automation and AI will continue to shape all aspects of how we live: some for the better, others for worse. Animals, with us counted among them, can take hundreds of years to evolve and learn new practices. So far mankind has been a mixed bag in how we’ve handled new [...]

By |2017-08-07T15:13:16-04:00August 7th, 2017|Blog|Comments Off on Why cyber security is so difficult.

How ransomware can delete your backups

It’s too early to say what 2017 will be remembered for, but the proliferation of cyber attacks and digital chicanery have been headline news all year.  Whether you’re talking about the rash of ransomware attacks, ominously dubbed “WannaCry” and “Petya”; or the alleged Russian hacking of our most recent election, digital crime is more prevalent than ever.  Sophisticated or not, hackers are causing major [...]

By |2017-07-24T11:18:03-04:00July 24th, 2017|Blog|Comments Off on How ransomware can delete your backups

The Petya Ransomware – What is it?

The digital age has afforded us many luxuries in the 21st century.  We’ve bypassed rude cab drivers, enabled food deliveries without moving from the couch, and even worked how to meet the opposite sex without talking to anyone.  Teleporting is about the only sci-fi fantasy we are still waiting on.  Unfortunately, this dependence on technology leaves us vulnerable to an age of cyber criminals [...]

By |2017-07-20T13:59:15-04:00July 20th, 2017|Blog|Comments Off on The Petya Ransomware – What is it?

Ransomware Prevention and Resolution

As the American philosopher Drake would say, 2017 is a great time to be alive.  It can also be a precarious time to be alive, especially, if you haven’t popped out of a time machine and your livelihood is stored digitally.  Whether you are an individual or a company, you store sensitive and valuable data on your computer systems daily, information that you might [...]

By |2017-07-12T11:40:21-04:00July 12th, 2017|Blog|Comments Off on Ransomware Prevention and Resolution

5 Steps – Physical to Virtual Migration of Exchange 2010 Using Gbridge

In this blog, I will show you how to migrate a physical server running Exchange 2010 and Active Directory to a virtualized environment with some pretty simple steps.  Although there is some downtime due to the transfer of large files, this can be overcome by physically delivering the large files to your data center or server.  I am using VMWare Esxi 5.1 on a [...]

By |2013-11-30T22:49:41-05:00November 30th, 2013|Blog|Comments Off on 5 Steps – Physical to Virtual Migration of Exchange 2010 Using Gbridge