Backup Systems Disaster Recovery Blog

Losing your systems is a lot scarier than ghosts!

It’s Halloween! And while you may be more inclined to carve pumpkins, and dress up in spooky costumes, you may find yourself stressing about the fact you have lost access to your systems.

QNAP shuts down hackers conducting brute-force attacks.

A malicious server used in widespread brute-force attacks was taken down by QNAP recently, the server took advantage of internet-exposed NAS (network-attached storage) devices with weak passwords.

Looking to restore your backups to a separate location? We can help with that!

More often than not if someone wants to restore a backup of their system, they want to do it where the original backup was taken from. This is easily done by us and is one of the most common forms of a backup and restore. But what if you want to restore a backup elsewhere? is that possible? Well, the answer is yes, and there is a number of ways in which we can do it.

Breached SQL servers lead to hackers targeting Azure cloud VM’s.

With hackers relentlessly finding new ways to cause a nuisance to your systems every day, it’s no surprise that they’ve found another way to gain access where they shouldn’t. This time they are targeting cloud environments, by making use of Microsoft SQL Servers that are vulnerable to SQL injection.

Cyber Security Awareness Month 2023

Every year since 2004, October has been Cyber Security Awareness Month, an initiative put in place to raise awareness of cyber security. They’re a few things that you as a user should be doing to maintain security with your systems, and just as easy they are to put in place, they are easy to miss, leaving you vulnerable to hackers. Here are a few things listed below to look out for, to ensure you’re protected as best as possible.

Are your backups encrypted?

You might think that a simple backup of your files is enough to protect them, but what if someone was to gain unwarranted access to them? Ensuring your files are encrypted is the best method of preventing a hacker from viewing or stealing them. Whether this be while they are at rest or in transit, if they aren’t encrypted, they can be compromised.