A Rising Threat: Phishing and Crypto-locker Viruses Over the past several years, two types of cyber-attacks have become increasingly prevalent in the SMB segment: phishing and crypto-locker style viruses. Fortunately,... read more →
Backup Pitfalls This may come as a surprise - just because backups are “working” does not necessarily mean that the backups are catching all of the data. Additionally, the data... read more →
Virtual Infrastructure: Promise and Complexity Most companies in the SMB segment have been aware of the benefits of a virtualization for years. Unfortunately, in some cases the promise of high... read more →
Background – How bad is your Nightmare Scenario? In the modern world, losing access to data and systems can cut the value of a company in half in a matter... read more →
In some ways we are fortunate that VMware continues to work even when it is configured incorrectly... and in other ways we are not. At CVM we often take over... read more →
Overview There are many technology systems with which increased capability follows increased complexity and consequent responsibility. A simple example is an automated traffic light at a multi-lane four way intersection.... read more →
Recent changes in technology have altered how the cloud can protect your business infrastructure. The goal of cloud based backup, disaster recovery (DR), and business continuity (BC) services has changed from... read more →
When customers need to troubleshoot their cloud-based applications, they reach for two things: Wireshark and a Network Tap. Wireshark’s open source network protocol analyzer capability allows users to decode packet... read more →