Restore from a cloud provider with Veeam Agent for Microsoft Windows
In my previous blog, we walked through Veeam Agent for Microsoft Windows configurations and ways it provides for backing up data on travelers’ laptops to a cloud provider. Now should you need to recover your data, let’s see how to do it and which options you have with Veeam Agent.
Read moreBackup to a cloud provider with Veeam Agent for Microsoft Windows
One of the best things about Veeam Agent for Microsoft Windows is the ability to back up to and restore from one of the many Veeam Cloud Service Providers. This functionality opens up a new use case for Veeam Agent for Microsoft Windows, the business traveler.
Read moreUsing orchestration to minimize downtime and maximize compliance
It seems like it’s almost every day that the news reports another major company outage and as a result, the massive operational, financial and reputational consequences experienced, both short- and long-term. Widespread systemic outages first come to mind when considering disasters and threats to business and IT service continuity. But oftentimes, it’s the overlooked, “smaller” threats that regularly occur. Human error, equipment failure, power outages, malicious threats and data corruption can too bring an entire organization to a complete standstill.
Read moreWhy is ransomware still so successful?
There’s no end to ransomware in sight. It’s a simple enough attack — install malware, encrypt data/system, and ask for the ransom — so why aren’t we stopping ransomware? Security vendors are keenly aware of the issue, as well as the attack vectors and methods, but can’t seem to stay a step ahead, causing ransomware to grow from $1 billion in damages in 2016 to an estimated $5 billion in 2017. There are two basic reasons ransomware continues to be a “success” for cyber criminals.
Read moreWhy it makes sense to combine Veeam, DXi dedupe and tape to be protected against ransomware
Encryption is a great way to keep data secure, but sometimes it can be used against us. Yes, we’re talking about ransomware.
When ransomware enters your systems, usually through a PC, it begins to encrypt your data and can target network-attached storage (NAS), virtualization, online collaboration tools, and even your online backups to render them unusable.
Read moreRansomware history highlights: from AIDS Trojan to Locky
Ransomware attacks are not a fake threat – they are real and increasing day by day. The below insights on ransomware history can help you understand the evolution of its delivery and extortion strategies and be better prepared in case you become the victim of an attack.
Ransomware, locker or crypto-malware, has been around for a long time — decades in fact. Originally, ransomware was an annoyance and a con-trick, but today’s ransomware is considerably different and presents much more of a sophisticated threat to systems and users.
Read moreRansomware payments: Funding the business of cybercrime
If you were considering becoming a cybercriminal or were perhaps a traditional villain looking to upgrade your skills for the 21st century, I’m sure your business model of choice would be running a ransomware operation. You would, thanks to the simplicity of platforms like Ransomware as a Service and the willingness of victims to pay ransomware fees, be running a very successful business — albeit an illegal business — in a matter of days or weeks. Such is the ongoing success of ransomware as a means of extorting money from victims.
Read moreGet the most of your VMware alarms with Veeam ONE
Monitoring data center performance is an essential part of every IT administrator’s job that shouldn’t be overlooked. There are many avenues you can go down when looking at a tool to help monitor performance, but with Veeam, you can do this with Veeam ONE. Veeam ONE has many capabilities, but one of the most important features is the alarm it triggers when part of your virtual environment isn’t working as it should. Pre-built alarms included in Veeam ONE keep IT administrators up-to-date on the operations and issues occurring in their environment in real-time.
Read moreAttention: Your backup infrastructure is under attack
The backup infrastructure is a primary target for attack because all relevant environment data is stored in that one single place. Second, if an attacker wants to destroy data, the backup environment is a good starting point because the backup server has access to pretty much every other important system, such as virtualization platform or storage systems.
Read more