Pitching Disaster Recovery
I recently finished an 8-step series on business recovery, where I covered a number of methodologies that would not only enhance your...
Business Recovery, Step 8: Disaster Recovery Testing
We’ve reached the final article in this 8-step program. Throughout the last 7 articles, I’ve laid the foundation for expanding your...
Business Recovery, Step 7: Bare Metal Recovery
We’re nearly at the end of this series of articles covering the ways you can improve business recovery, while increasing your service...
Business Recovery, Step 6: V2V
Virtual to virtual (V2V) recovery involves the backing up and recovering of virtual machines. So you may be thinking that your customer...
Business Recovery, Step 5: File Level Recovery
In my previous article (in this 8-step “recovery” program for businesses) I talked about the recovery of critical files, the recovery...
SMBs Are At Higher Risk Of Cyber Crime
If you work for a small business, you probably believe you’re not a target for cyber crime, largely because you have little of value to...
Business Recovery, Step 4: File Versioning
Most backups are relatively small because they only contain changes made (at a file or, even better, a block level) since the last...
Business Recovery, Step 3: Continuous Recovery
In my last article, I discussed how some applications are so critical, they need to be recovered using timeframes in terms of minutes –...
Three Basic Steps to Avoid Hacker Attacks
In the wake of so many security breaches, each news report seems to always focus on two things and two things only: The number of...
Business Recovery: The 8 Step Program
Your business could use some additional revenue, and your clients could use some additional protection. It’s a vicious circle that only...