dcsimg

How to Quickly Recover and Restore Windows Server Hyper-V Backups

This article explains the best practices for how to recover data from a backup and bring your services back online as fast as possible Read the post here: How to Quickly Recover and Restore Windows Server Hyper-V Backups … [Read more...]

How to Build Redundancy in your Hyper-V Backup Configuration

Backing up services and data is critical. Here are the best practices of building resiliency into your backup infrastructure and minimizing data loss Read the post here: How to Build Redundancy in your Hyper-V Backup Configuration … [Read more...]

15 Best Practices for Protecting Your Email with Security Gateway

Despite the rumors announcing the death of email, its use continues to grow. According to research from the Radicati Group, email traffic is predicted to grow to over 333.2 billion emails sent per day (from the current 306.4 billion emails). And as long as businesses continue to use email, cybercriminals will find new ways to exploit security gaps, software bugs, and basic human nature to extort … [Read more...]

How to Use Failover Clusters with 3rd Party Replication

The different types of replication options and what you need to ask your storage vendor if you are considering a third-party storage replication solution Read the post here: How to Use Failover Clusters with 3rd Party Replication … [Read more...]

Business Email Compromise Discussed on NPR’s Morning Edition

Earlier this week, I heard an interesting interview on NPR’s Morning Edition with a recent victim of Business Email Compromise (BEC), a growing threat that uses social engineering to exploit human nature in order to divert massive amounts of money to cybercriminals. Recent Business Email Compromise Trends show Evolving Tactics First, let’s start with a little background information. In … [Read more...]

How to Select a Placement Policy for Site-Aware Clusters

Learn the automatic placements policies and advanced settings used to maximize the availability of your virtual machines (VMs) with site-aware clusters Read the post here: How to Select a Placement Policy for Site-Aware Clusters … [Read more...]

What is Quorum Vote Weight in a Windows Server Failover Cluster?

Genuine high-availability covers outages and long-term failures. Learn how dynamic quorum automatically sets the nodes needed to keep workloads running Read the post here: What is Quorum Vote Weight in a Windows Server Failover Cluster? … [Read more...]

The 7 Deadly Privileged Accounts You MUST Discover, Manage and Secure

Privileged accounts and privileged access are at the heart of every business today. They ensure that the IT team can administer and manage the organization’s systems, infrastructure, and software, and they enable employees to access the data that enables them to make critical business decisions. Not only are most businesses dependent on privileged accounts, but they are also the accounts most … [Read more...]

Cyber Security Incident Response and Reporting Process

Ever since we launched our customizable cyber security incident response template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware and ransomware is starting to be taken seriously by organizations large and small, and that there is a growing demand for guidance and information on incident response. Mangools.com—a … [Read more...]

New Hire Onboarding Checklist: A CISO’s Perspective

When a new employee enters an organization there are various behind-the-scene activities that must take place to ensure the new hire an efficient onboarding experience. Many are administrative in nature and are taken care of by HR. But then there are those related to cyber security—and they are far too often overlooked. As a security leader, my job is to make sure the proper security controls are … [Read more...]