Home Tags Disaster Recovery

Tag: Disaster Recovery

Disaster recovery (DR) involves a set of policies and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster. Disaster recovery focuses on the IT or technology systems supporting critical business functions, as opposed to business continuity, which involves keeping all essential aspects of a business functioning despite significant disruptive events. Disaster recovery is therefore a subset of business continuity.

Databarracks recognised in Gartner’s Magic Quadrant for Disaster Recovery as a...

Provider named a Niche Player in Magic Quadrant for DRaaS for third consecutive yearLondon-based provider Databarracks has been recognised in Gartnerrsquo;s Magic Quadrant for Disaster Recovery as a Service 2017. Peter Groucutt, managing director at Databarracks, commented on the announcement: “We are very proud to be included in the Magic Quadrant for DRaaS for a third consecutive year. We feel it is an incredible achievement for us as a specialist provider of disaster recovery and... Source: RealWire

Databarracks becomes a ‘Corporate Partner’ of the BCI to help drive...

Disaster recovery service provider Databarracks, has become a ‘Corporate Partnerrsquo; of the Business Continuity Institute (BCI), working with it to raise the profile of business continuity management (BCM) as a critical discipline for business resilience, amongst the SME community.

Founded in 1994, the BCI has established itself as the leading organisation for BC professionals worldwide, supporting over 8,000 members in more than 100 countries and working with an estimated 3,000 organisations in private, public and... Source: RealWire

BrandPost: How To Prepare and Prevent Ransomware From Wreaking Havoc

By Bharath Vasudevan, Director of Product Management, Hewlett Packard Enterprise Software-defined and Cloud GroupRansomware is a malicious software virus that locks files or computer systems until a sum of money (usually in Bitcoin) is paid to the cyber criminals. With ransomware attacks increasing in quantity and ferocity seemingly by the day, it is no longer a matter of if an organization will be attacked by ransomware, but when.

According to the Ponemon Institute’s January 2016 report, Cost of Data Center Outages, 22% of unplanned IT outages are due to cyberattacks.

This represents a 167% increase since the initial 2010 report.
Stronger security and improved data protection and disaster recovery plans may be businesses’ only hopes to minimize the damage done by ransomware.To read this article in full or to leave a comment, please click here

UKCloud launches Disaster Recovery to the Cloud service

London – 11 April 2017 – UKCloud, the easy to adopt, easy to use and easy to leave assured cloud services company, has today announced the launch of Disaster Recovery to the Cloud, a self-service replication and recovery solution, powered by market leading disaster recovery software provider, Zerto.

As UK citizens increasingly expect to be able to access services online, around the clock, it has become even more important for public sector departments to invest... Source: RealWire

Phishing scammers exploit Wix web hosting

Cybercriminals like to subvert legitimate online services like Google Docs and Dropbox to carry out their malicious activities.

The free website hosting company Wix is the latest addition to the list of services they’ve abused.Researchers from security company Cyren found that scammers were creating phishing sites designed to harvest Office 365 login credentials via Wix, which offers a simple click-and-drag editor for building web pages.

As typically happens with free services, the criminals are taking advantage of these tools to carry out their operations.[ 4 top disaster recovery packages compared. | Backup and recovery tools: Users identify the good, bad, and ugly. ]The phishing site looks like a new browser window open to an Office 365 login page.
In fact, it’s a screenshot of an Office 365 login page with editable fields overlaid on the image. Users would think the site is legitimate and enter the login credentials, except the information is entered into the fields on the overlay and not the actual Office 365 page.To read this article in full or to leave a comment, please click here

Coders and librarians team up to save scientific data

On a windy, snowy night in Dover, N.H., about 15 people gathered in an old converted mill, staring at computer screens and furiously tapping at their keyboards.The group – some students, some programmers, and at least one part-time dishwasher and data entry clerk – were braving the snowstorm and volunteering their time to try to keep scientific data from being lost.[ 4 top disaster recovery packages compared. | Backup and recovery tools: Users identify the good, bad, and ugly. ]It was one of dozens of data rescue events spread out in cities from Toronto to Los Angeles, and Houston to Chicago.

These events, many on university campuses, have been going on since December, bringing together software programmers, librarians and other volunteers who are trying to safely archive scientific data from government websites.To read this article in full or to leave a comment, please click here

Disaster recovery: How is your business set up to survive an...

Asynchronous vs synchronous.

Dark disaster recovery vs. active architecture.

Active/active vs. active/passive. No setup is objectively better or worse than another.

The best one for you primarily depends on your level of tolerance for what happens when the server goes down.Security experts say how individual companies choose to save their data in anticipation of an outage depends on how long they can survive before the “lights” are turned back on. What level of availability does your company need? Is the face of your company an ecommerce site where even a few minutes offline can cost an astronomical sum? Will the cost of an active-active system outweigh the potential loss of business from an outage?To read this article in full or to leave a comment, please click here

Eutelsat Broadband boosts speed and sets the industry standard for data...

Optimised for organisations with slow or no fixed line access and those requiring alternatives for solutions such as disaster recovery or back-up28th February 2017. London, UK. – Eutelsat Broadband today announced an improved range of tooway™ Business satellite broadband services designed to meet the needs of SOHO, SMB and Corporates located across Europe, North Africa and large parts of the Middle East.

The new services include boosted download speeds from 22Mbit/s to 30Mbit/s and an... Source: RealWire

Databarracks sponsors world record attempt for the first woman to successfully...

Disaster recovery service provider Databarracks has today announced sponsorship of Lia Ditton’s attempt to be the first woman to successfully row the North Pacific Ocean.

Departing in early 2018, sailor and writer Lia Ditton will attempt to row approximately 5,500 nautical miles alone from Japan to San Francisco – a journey currently only two other people have successfully completed solo.

Databarracks, along with YO! Company, is sponsoring the expedition.Peter Groucutt, managing director at Databarracks, commented:... Source: RealWire

Intel’s Atom is underwhelming no more: New chip packs 16 cores

Intel's Atom was mostly known as a low-end chip for mobile devices that underperformed.

That may not be the case anymore.The latest Atom C3000 chips announced on Tuesday have up to 16 cores and are more sophisticated than ever.

The chips are made fo...

Flaw in Intel Atom chip could crash servers, networking gear

A flaw in an old Intel chip could crash servers and networking equipment, and the chipmaker is working to fix the issue.The issue is in the Atom C2000 chips, which started shipping in 2013.

The problem was first reported by The Register.[ 4 top disaster recovery packages compared. | Backup and recovery tools: Users identify the good, bad, and ugly. ]In January, Intel added an erratum to the Atom C2000 documentation, stating systems with the chip "may experience [an] inability to boot or may cease operation."To read this article in full or to leave a comment, please click here

Surviving a cloud-based disaster recovery plan

Getting data offsite is easier today, but what happens when the Internet isn’t there?