The Case of the Talking Computer

Potential customer calls yesterday evening requesting information about anti-malware protection for his 14 year old son's computer. After some conversation, the father assisted me with gaining remote access to the son's computer. Once I was able to see the screen, it was full of pornographic images. I could hear, through the phone a half dozen [...]

By | 2017-12-21T12:12:15+00:00 December 21st, 2017|Business, Business Continuity, Security, Services|0 Comments

What is PACE?

 PACE is a planning tool I learned in the ARMY. PACE is an acronym for Primary, Alternate, Contingent and Emergency. Specifically, at the time, it was used to describe the communications plans for a unit in different situations. Over time, I have learned to apply PACE to many other aspects of life and business. Here [...]

By | 2017-11-07T13:54:26+00:00 November 7th, 2017|Business Continuity, Policies, Procedures, Readiness|0 Comments

How-To Protect Against Ransomware

Today in a networking meeting, I was asked "What is the best way to protect against these ransomware threats?" As an I.T. guy, my immediate answer was … well, sarcastic. Something about air-gapped systems with no internet access and so on. In reality, not a practical, though accurate answer. Fortunately, Stephanie understood I was giving [...]

Why WannaCry was so easily spread

This past weekend, May 13th of 2017, the WannaCry ransomware virus spread like wildfire, around the planet. Worming it's way form machine to machine, the WannaCry virus used a network vulnerability in the Windows Operating System. A vulnerability that Microsoft had already released a patch for, the previous February. WannaCry infected thousands of computers, including [...]

By | 2017-05-15T10:37:33+00:00 May 15th, 2017|Backups, Business, Business Continuity, Policies, Security, Services|0 Comments

File Replication Between Two Servers

In a small business environment backups are just as critical as in any other business. If not more critical for larger businesses with dedicated technical staff. One issue with backups is the time delay between a file accidentally being deleted or over-written and when it can be restored. Fortunately, MS Windows Server 2008 and forward [...]

By | 2017-02-09T14:20:40+00:00 February 9th, 2017|Backups, Business Continuity|0 Comments

How to Backup Single User Data on a Windows 8 Systems

A Facebook conversation today lead a contact to ask how to perform a Windows 8 backup. This lead to a few questions and answers and a promise to create this blob post. So, let's just jump into it. Before getting started, we need to recognize that Microsoft removed the NT Backup utility from Windows 8. [...]

By | 2017-02-02T18:49:14+00:00 February 2nd, 2017|Backups, Business, Business Continuity, Documentation, Policies, Procedures|0 Comments

10 Reasons to get a Tune-Up

If your company has never had a Network Tune-Up then you may not realize all of the immediate benefits that you will receive upon its completion. Below are ten of the most compelling benefits to your company. As you know, a tune up will not solve all problems. The tune up catches problems early, before [...]

The 4 C’s of Business Continuity Planning

If you have or run a business, then you have had those nights of no sleep, as you worry about 'What if'. Every business owner has had these worries. Ranging from 'What if the weather guy is wrong and we are hit with a blizzard?' to 'Fred is my strongest employee. What would we do, [...]

You Hacked, ALL Data Encrypted

"You Hacked, All Data Encrypted" was the message on computer systems through the San Francisco Municipal Transportation System, known as MUNI, after a piece of malicious software got on their network. The screen left by the hackers included an e-mail address to supposedly contact for the decryption key. Reports say the hackers were asking for [...]

By | 2016-11-29T22:58:45+00:00 November 29th, 2016|Backups, Business, Business Continuity, CIO/CTO, Policies, Security|0 Comments