A Rising Threat: Phishing and Crypto-locker Viruses Over the past several years, two types of cyber-attacks have become increasingly prevalent in the SMB segment: phishing and crypto-locker style viruses. Fortunately, both are entirely preventable. Additionally, there are numerous steps which can be taken to mitigate the damage to the business... read more →
Nov
09
Oct
21
Backup Pitfalls This may come as a surprise - just because backups are “working” does not necessarily mean that the backups are catching all of the data. Additionally, the data that has been “caught” may not be usable. Systems services such as databases, email, credentialing, and collaboration are all subject... read more →
Oct
18
Virtual Infrastructure: Promise and Complexity Most companies in the SMB segment have been aware of the benefits of a virtualization for years. Unfortunately, in some cases the promise of high availability, better performance, and better utilization of hardware comes up short. This is rarely a problem of technology, but rather... read more →
Oct
12
Background – How bad is your Nightmare Scenario? In the modern world, losing access to data and systems can cut the value of a company in half in a matter of moments. Much of a company’s value is dependent on its technology systems and data, which makes protecting that infrastructure... read more →
Oct
04
In some ways we are fortunate that VMware continues to work even when it is configured incorrectly... and in other ways we are not. At CVM we often take over the administration of a VMware platform in production use. Some platforms are configured correctly while others function but have configuration... read more →
Feb
18
Overview There are many technology systems with which increased capability follows increased complexity and consequent responsibility. A simple example is an automated traffic light at a multi-lane four way intersection. The power of the traffic light is in its ability to efficiently route vehicles though the intersection. This is done... read more →
Feb
18
Recent changes in technology have altered how the cloud can protect your business infrastructure. The goal of cloud based backup, disaster recovery (DR), and business continuity (BC) services has changed from providing a disaster recovery solution to providing a business continuity solution. This change has become necessary as businesses are increasingly reliant... read more →
Feb
18
When customers need to troubleshoot their cloud-based applications, they reach for two things: Wireshark and a Network Tap. Wireshark’s open source network protocol analyzer capability allows users to decode packet communication through their networks to identify problem areas. Inserting a network tap between the carrier’s demarc and local firewall provides... read more →