Recover by Storcom™ Disaster Recovery Solution

Our powerful disaster recovery-as-a-service solution (DRaaS): Recover by Storcom™

Choose a Top Disaster-Recovery-as-a-Service Solution Provider for Peace of Mind

Don’t Underestimate Your Data’s Value

Companies understand that they need to protect their most important asset: their data! Data backup, disaster recovery, and business continuity (commonly known as “BC/DR”) were once low budget priorities. However, they are now at the forefront of IT planning and business strategy due to the plethora of threats companies face today like viruses, malware, hackers, natural disasters, accidents, and hardware failures.

Rightfully so, data backup and disaster recovery should be at the forefront of IT planning and strategy instead of a costly afterthought. Every business should plan and implement procedures for disaster recovery in order to prevent major data loss in the future, and also have a strategy in place should disaster strike. Data loss is a huge blow to an organization’s productivity and budget. Recover by Storcom™ is a disaster-recovery-as-a-service solution that can help companies prepare for the future, and also recover their data should worse-case scenario occur.

Scary fact: 50% of restores fail and 60% of backups are incomplete.

Often times, we do not realize how reliant we are on data. Imagine a scenario where your network goes down for days and you are unable to access critical files, client databases, accounting and financial documents, and just about every single file that your company has ever created or produced.

Disaster Recovery-as-a-Service Questionnaire:

  • Do you think your company could still function without access to any of your data?
  • How do you think you could recover from an outage?
  • How quickly do you think you would be able to get your network up and running again?
  • Do you have a backup solution for your data already in place?
If you struggled to answer any of these questions, then contact us today for a BC/DR solution!

A Preventable Mistake that Could Cost You Your Company

Storcom wants our clients to have comfort that they are dealing with thought leaders, subject matter experts, and a turnkey technology partner in disaster recovery solutions. Storcom understands the Cloud and we know when and where to leverage the private cloud and fit it into your disaster recovery strategy.

Storcom will help you determine if your organization can develop a hybrid cloud approach to data recovery. We provide cloud migration with reduced time and risk by understanding your applications. We will determine how disaster recovery will come into play if you move to a public, private, or hybrid cloud. In short, Storcom is our motto: Evolve to the Cloud™.

Learn More

Managed IT Managed Services for Large Manufacturing Company

Provided Full Managed Services for Entire On-Premises and Disaster Recovery Site Infrastructure for Large Chicago-based Manufacturing

View case study

Multifaceted Solution Strategy for American Manufacturer

Designed and implemented multiple data storage solutions and data protection strategies for a large American designer, manufacturer, and marketer of high-end tools and equipment.

View case study

DR/BC Strategy Implementation for Architectural Firm

Implemented a full DR and BC strategy for a large Chicago-based architectural firm.

View case study

Data Protection Strategy for Large Non-Profit

Implemented a robust data protection strategy for large Chicago-based non-profit after they suffered downtime from ransomware.

View case study

Ransomware Prevention and Recovery Roadmap™ Infographic

View Storcom’s Ransomware Prevention and Recovery Roadmap™ Infographic.

View infographic

Recover By Storcom™ Infographic

Let Storcom keep you afloat after a critical loss. View the Recover By Storcom Infographic.

View infographic

Storcom’s Process

  • Storcom starts with data classification
  • We apply a recovery time and recovery point to each type of data point
  • We take the time to learn about our clients’ applications and how users interact with them
  • Storcom understands our clients’ unique company requirements for remote connectivity
  • Storcom determines what technology options align with the necessary RPO and RTO
  • We know how the cloud can be leveraged to reduce operational expense
  • Storcom develops a comprehensive business continuity strategy custom-tailored to your needs

Notable Questions to Ask Yourself

Here is a checklist of questions you should ask yourself about your disaster recovery and backup strategy.

Can your organization…

  • Give end-users access to applications that meet your corporate SLAs?
  • Support your applications around the clock and around the globe?
  • Provide access to key data from multiple end point locations and devices?
  • Test DR with successful fail-back and restore undisrupted?
  • Provide a single management pane of glass into the health and current state of all data protection policies?
  • Develop a hybrid cloud approach to DR?

If you answered “no” to any of these questions, then Storcom can help with designing, implementing, executing, and testing a comprehensive DR/BU strategy.

Benefits of Working with Storcom

Storcom has been enabling small-to-mid-sized and enterprise organizations to make key decisions on the management, movement, and protection of their data for nearly two decades. From infrastructure and Recover by Storcom, to our Cloud Enablement Roadmap® and implementation of cloud migration solutions, our holistic consulting approach guarantees satisfaction from planning all the way through design, managed services, and support.

Executives can stay ahead of the IT curve when partnering with Storcom knowing that their data is secure and protected, and they have peace of mind with Storcom at the helm. Your office may be down but you’re still in business with Recover by Storcom. If a company’s goal is to safely back up and recover their data, then Storcom guides our clients through the complicated process with our Recover by Storcom solution.

Storcom has teamed with industry leaders to provide turnkey solutions to deliver data protection as a service at a cost that makes sense for any business size.

  • Storcom’s solutions are built on the foundation of service-oriented infrastructure.
  • Customers can use Storcom’s private cloud as a target or we can simply help you manage on-prem within your own data centers to leverage existing infrastructure.
  • Storcom provides a data recovery solution to solve all common business challenges as they relate to off-site data retention and disaster recovery.
  • We don’t treat all data as equal; operational recovery is vastly different from the formula of traditional data backup and disaster recovery.
  • The Recover by Storcom solution provides a set of tools to give your team insight into capabilities to keep your business running.

5 Data Backup and Recovery Statistics that Every IT Professional Should Know

  1. According to the National Archives and Records Administration, 93% of businesses who lost access to their data for 10 days filed for bankruptcy within one year of the disaster, and 50% of those companies filed for bankruptcy immediately.
  2. Richmond House Group says that every 5 years nearly 20% of small-to-medium-sized businesses will suffer a massive disaster that causes loss of critical data.
  3. According to Symantec, 31% of targeted attacks are directed at businesses with fewer than 250 employees.
  4. National Cyber Security Alliance states that 20% of all small businesses will be hacked within a year.
  5. According to Gartner, 40% of small-to-medium-sized businesses who use the Internet and manage their own network will have that network accessed by a hacker. What’s even scarier is that more than 50% of these businesses will not even know that they were attacked.

Are you alarmed, worried, and concerned about your data? IT professionals need to protect and secure their valuable data, and not play a game of Russian Roulette. Now you can act: plan and implement a solution like Recover by Storcom to give you peace of mind.

Make Sure Your Data Backups are Complete

Did you know that 50% of restores fail and 60% of backups are incomplete?

Often times, we do not realize how reliant we are on data. Imagine a scenario where your network goes down for days and you are unable to access critical files, client databases, accounting and financial documents, and just about every single file that your company has ever created or produced.

Now try to answer these questions:

  • Do you think your company could still function without access to any of your data?
  • How do you think you could recover from an outage?
  • How quickly do you think you would be able to get your network up and running again?
  • Do you have a backup solution for your data already in place?

               If yes:

    • Are you positive that you can restore your data?
    • Do you know if your backups are 100% complete?

Are you alarmed, worried, and concerned about your data? Good. You should be!

IT professionals need to protect and secure their valuable data, and not play a game of Russian Roulette. Now you can act: plan and implement a solution like Recover by Storcom™ to give you peace of mind.


Learn how you can save money on backing up your precious data with Storcom. Storcom’s Ransomware Prevention and Recovery Roadmap™ solution can save your business thousands in the event of a disaster. While you may not be able to foresee an accident or a ransomware attack, you can rest assured that your critical data is safe with Storcom.

  • 2TB
  • 4TB
  • 6TB
  • 8TB
  • 10TB
  • 12TB
  • 14TB

$558 / MONTH

Estimated cost for 2 terabytes of data storage.

$1,116 / MONTH

Estimated cost for 4 terabytes of data storage.

$1,674 / MONTH

Estimated cost for 6 terabytes of data storage.

$2,232 / MONTH

Estimated cost for 8 terabytes of data storage.

$2,790 / MONTH

Estimated cost for 10 terabytes of data storage.

$3,348 / MONTH

Estimated cost for 12 terabytes of data storage.

$3,906 / MONTH

Estimated cost for 14 terabytes of data storage.


Storcom can alleviate your concerns across the spectrum of information technology. We can create, design, and implement innovative solutions to keep your business operational and performing at its best.




Successful Disaster Recoveries


Evolved Businesses

Disaster Recovery FAQS

Learn more about disaster recovery with Storcom’s comprehensive library of definitions and Frequently Asked Questions.

Storcom managed IT services & solutions provider Chicago managed IT data migration solutions image

What is Continuous Data Protection?

Learn More

Continuous Data Protection (CDP) allows organizations to automatically capture and track data modifications, saving every version of user-created data locally or at a target repository. With little-to-no production overhead, incremental writes are replicated continuously and saved to a journal file. CDP’s change block tracking also allows users or administrators to restore data to any point in time with remarkable granularity.

Real-Time Block-Level Replication

CDP utilizes change-block tracking to constantly replicate data as it is written to storage. Because CDP is always-on, it offers considerably lower Recovery Point Objectives (RPOs) than snapshot-based solutions – this means almost no data loss.


Snapshots vs. Continuous Data Protection

Continuous data replication allows organizations to replicate data as changes occur, delivering recovery intervals of mere seconds. Snapshots are scheduled rather than continuous, because of their impact on production, meaning recovery intervals of hours.


Journal-Based Any Point-In-Time Recovery

Journal-based recovery keeps a constant log of all the changes users make to applications and data. Because the changes are continuously written to the datastore, CDP delivers any point-in-time recoverability to within a specified time frame.


No Performance Impact

Storing multiple snapshots on replica VMs incurs a significant performance penalty when attempting to power on replica VMs. Zerto’s continuous data protection uses a journal to commit to a point in time selected for recovery, with no performance impact.


Enterprise Scalability

The journal can be placed on any datastore with maximum size limits and warnings – preventing the datastore from filling which would otherwise break replication. Using snapshots provides no way of controlling the total space used, so snapshot solutions are not scalable in terms of SLAs and efficiency.


Storage Savings

Because no snapshots are created, CDP typically uses just 15% of additional storage, resulting in dramatic savings and significant amounts of free space. Snapshot technologies require significant overhead on storage, often requiring an additional 20-30%.


Storcom is a top Zerto solution provider headquartered in the Chicagoland area in Lombard, IL. We service clients in Naperville, Geneva, Northbrook, Aurora, Joliet, Oak Brook, and many many more.

Storcom managed IT services & solutions provider Chicago managed IT infrastructure cloud migration solutions image

What is the Main Issue with Public Cloud-Based Disaster Recovery?

Learn More

To put it simply, effective DR/BU is complex: it is not just about restoring VMs. It’s about the applications and the “what, where, and how” users will use these applications.

Storcom managed IT services & solutions provider Chicago managed IT infrastructure cloud migration solutions image

What are the Main Issues with Basic “Cloud Backup” as-a-Service Solutions?

Learn More

The data is off-site but does not provide the necessary capabilities to recover applications and meet SLAs.

Traditional legacy backup software falls short in today’s IT-as-a-Service (ITaaS) and virtualized environments.

Storcom headset icon Chicago

What are the Challenges, Issues and Complexity to Backup/Data Recovery?

Learn More

Issues with traditional approach to backup and recovery:

  • Full backup windows extend beyond SLA requirements
  • Lengthy recovery windows can drastically impact business operations, customer experience, and revenue
  • Difficult to orchestrate or automate DR processes
  • Tests are run infrequently due to complexity and disruption concerns
Storcom managed IT services & solutions provider Chicago managed IT infrastructure cloud migration solutions image

How Do You Prevent Data Loss?

Learn More

Since ALL tape backups will fail at some point in time, organizations are quickly learning that tape is not always an adequate form of data backup. Tape drives can malfunction without showing warning signs, become corrupted due to accidental misformatting, mishandling, heat, or being hit by a virus, and this can make it impossible to recover your data. The best way to prevent tape backups from failing is to have a remote backup solution in place. Also known as “offsite backups” or “managed backups,” your data is secure and safe in a location that is not your office or data center.

It is more important than ever for companies to have a solid disaster recovery plan and data recovery strategy and an executable solution in place in order to prevent data loss.

Storcom managed IT services & solutions provider Chicago managed IT infrastructure cloud migration solutions image

What is Business Continuity (BC)?

Learn More

“Business continuity,” or “BC,” is the way that a business can maintain regular operations during an outage or systems malfunction. “Business continuity” should not be confused with “disaster recovery.”

What is DR/BU?

Learn More

The IT term “DR/BU” is short for “disaster recovery and backup.” Backup and disaster recovery is also often referred to as “BU/DR,” “DR/BC,” or “BC/DR” (disaster recovery and business continuity).

“Disaster recovery” is the way in which data, servers, files, software applications, and operating systems are restored following a disastrous event or systems failure. It should not be confused with “business continuity,” although the two phrases are usually used in the same breath.

Storcom managed IT services & solutions provider Chicago managed IT data migration solutions image

What are the Different Types of Hacking?

Learn More

Hackers can access your passwords in a multitude of different ways. The most common methods are shoulder surfing, social engineering, dictionary attacks, and just attempting to guess passwords from information about the user that’s available to them. Email hijacking is widespread. Hackers, spammers, and social engineers taking over control of people’s email accounts (and other communication accounts) has become increasingly more common. Once they control an email account, they prey on the trust of the person’s contacts. Be sure that you protect yourself by being diligent.

Storcom managed IT services & solutions provider Chicago managed IT data migration solutions image

Is My Data Storage Protected in the Event of a Disaster?

Learn More

Not necessarily. The safety of your data is dependent upon a number of different factors from storage methods, firewalls, encryption, backups, how your company’s users are accessing the data, and a host of other variables.

Data protection is defined as the safeguarding of your organization’s important information from corruption, compromise, or disaster-induced loss. It is one of the most overlooked aspects of information technology. With Recover by Storcom, your data is always secure. We use best-in-class security vendors to ensure that your data is always available, even in the event of a disaster or ransomware attack.


Storcom partners with best-in-class and emerging technology providers to enable our clients to stay on the cutting edge of information technology.

All Our Partners

Checkpoint solution provider Chicago Atlanta Grand Rapids Orlando gray logo Dell EMC solution provider Chicago Atlanta Grand Rapids Orlando gray logo Fortinet solution provider Chicago Atlanta Grand Rapids Orlando gray logo HPE solution provider Chicago Juniper Networks MSP solutions provider Chicago gray logo PureStorage solution provider Chicago Atlanta Grand Rapids Orlando logo black RSA solution provider Chicago logo Grey Veeam services provider Chicago Grand Rapids logo gray Storcom's partner, VMware, company logo Zerto provider Chicago Atlanta Grand Rapids Orlando logo grey

Disaster Recovery Insights and Trends

Read about the latest disaster recovery news and trends

Veeam and Storcom Ransomware Prevention and Protection in 2021 Webinar

What is Ransomware? What is the History of Ransomware? How is Ransomware Evolving in 2021? How Can I Prevent and Protect My Business Against a …

VMware Carbon Black Infographic

Learn more about VMware Carbon Black with Storcom’s new infographic! 

Recover By Storcom Powered By: 360 TCS

The Forrester Wave Data Security Portfolio Vendors Q2 2019

In our 25-criterion evaluation of data security portfolio providers, we identified the 13 most significant ones — Dell, Digital Guardian, Forcepoint, Google, GTB Technologies, IBM, Imperva, McAfee, Micro Focus, Microsoft, Oracle, Symantec, and Varonis — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals understand the respective strengths of each vendor’s portfolio.

Recover By Storcom Infographic

Learn how our Recover by Storcom solution can help you backup and protect your data in case of a disaster. 

Ransomware Recovery and Prevention Roadmap

Learn how to protect your data from ransomware with Storcom’s Ransomware Recovery and Prevention Roadmap solution. 

Zerto Disaster Recovery Guide CIO Ebook

In this e-book you will learn about BC/DR planning with Zerto’s IT Resilience Platform for virtualized environments. Today’s always-on, information-driven organizations require business continuity and IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!The eBook will provide insights into the challenges, needs, strategies, and solutions for disaster recovery and business continuity, especially in modern, virtualized environments and the public cloud.

Navigating Data Protection and Recovery at CLUS 2019 San Diego

It’s that time of year again. No, not the time to start making summer plans for the kids, but instead the time for Cisco Live 2019.  This year Cisco’s…

7 Spring Cleaning Tasks to Improve Data Security

Data security is a daily essential, but spring cleaning offers an opportunity to check in on your current practices and make changes where necessary.The post 7 Spring Cleaning Tasks to Improve Data Security appeared first on Security Intelligence.

4 Principles That Should Define Your Evolving Security Operations Model

It's never too soon to set the stage for your next-generation security operations model. Here are four important considerations to keep in mind.The post 4 Principles That Should Define Your Evolving Security Operations Model appeared first on Security Intelligence.

The 14 biggest data breaches of the 21st century

Not long ago, a breach that compromised the data of a few million people would have been big news. Now, breaches that affect hundreds of millions or even billions of people are far too common. About 3.5 billion people saw their personal data stolen in the top two of 14 biggest breaches of this century alone. The smallest incident on this list involved the data of a mere 134 million people.[ How well do you know these 9 types of malware and how to recognize them. | Sign up for CSO newslett…

6 ways attackers are exploiting the COVID-19 crisis

While organizations can take plenty of steps to ensure employees are well-equipped to work remotely in a secure manner, threat actors of all stripes are already taking advantage of the COVID19/coronavirus situation. Never ones to miss an opportunity, attackers are ramping up operations to spread malware via Covid19-themed emails, apps, websites and social media. Here’s a breakdown of potential threat vectors and techniques threat actors are using to attack organizations.To read this articl…

4 key problems with digital identity and why we need a new approach

Digital identity is now much more than a way to authenticate someone to access a resource. Identity and access management (IAM) has matured into a more holistic and consumer-led model, driven by privacy, cybersecurity pressures and greater functional needs. The services a consumer IAM system now must deliver require a new way of thinking about what a digital identity is and what functionality it has to perform.[ What is two-factor authentication (2FA)? Learn how to enable it and why you s…

Using Mystery Novel Techniques to Track Down Cyberthreats

If you consider yourself a good sleuth who can predict the end of every Agatha Christie novel, you might have a knack for discovering the origins of cyberthreats.The post Using Mystery Novel Techniques to Track Down Cyberthreats appeared first on Security Intelligence.

Free security resources for work-from-home employees during the COVID-19 crisis

As the world “shelters in place” amid the COVID-19 crisis, some tech companies are stepping up and offering their products and services free of charge for a limited time. These offers will help organizations set up and protect remote employees faster. In some cases, vendors are also offering support services to help companies through the set-up and deployment processes.[ Learn the 8 key security considerations for protecting remote workers. | Get the latest from CSO by signing up for our …

The 10 most powerful cybersecurity companies

Anyone who ever attended an RSA conference understands that cybersecurity vendors introduce hundreds of amazing, innovative products every year. But C-level execs aren’t looking for the flashiest new point products. Faced with a severe shortage of security professionals and up against rapidly evolving threats, CISOs are looking for strategic partners, advisory services, and vendors that offer broad platforms. They are also gravitating toward managed security services and cloud-based solution…

5 ways to tick off a CISO

YL Ventures Managing Partner Yoav Leitersdorf sat down with cybersecurity powerhouses Pete Bodine, Managing Director at AllegisCyber Capital, Mickey Boodaei, CEO & Founder at Transmit Security, Dino Boukouris, Founding Director at Momentum Cyber, Dawn-Marie Hutchinson, CISO at GSK, Jay Leek, Managing Director at ClearSky, Richard Rushing, CISO at Motorola Mobility, and Oren Yunger, VP at GGV Capital to discuss why security vendors keep CISOs up at night. However, a lot of the answers now s…

Differences Between Business Continuity and Disaster Recovery: How VMware Horizon Can Help with Both

In light of current events, many organizations are feeling the effects of life’s unpredictability. With many organizations canceling in-person events and meetings and mandating temporary work-from-home policies, companies are quickly realizing just how prepared they really are in the wake of unexpected events. In the second blog of our business continuity series, we’ll identify the differences between disaster recovery and business […]The post Differences Between Business Continuity and Disa…

VMware at RSA 2020: Intrinsic Zero Trust Access to Any App on Any Device

Cybersecurity discussions are front and center once again as the RSA Conference in San Francisco approaches. This year is no different with some of the top cybersecurity leaders and a dedicated community of peers getting together next week to exchange the biggest ideas that will move the industry forward. Each year, there are more new […]The post VMware at RSA 2020: Intrinsic Zero Trust Access to Any App on Any Device appeared first on VMware End-User Computing Blog.

VMware Carbon Black Cloud and Workspace ONE Intelligence – The Start of Things to Come

It’s no secret that security in the enterprise continues to be challenging in today’s world. One primary factor behind this is the difficulty involved in orchestrating communication among the many tools being used in the enterprise to protect endpoints and provide quick detection and response. Organizations are leveraging countless tools to try to minimize their […]The post VMware Carbon Black Cloud and Workspace ONE Intelligence – The Start of Things to Come appeared first on VMware End-Use…

Good Security Thrives in Simplicity

(This post is a collaboration between Carlos Phoenix, Senior Compliance and Cyber Risk Solutions Strategist, and Bob Plankers, Technical Marketing Architect, and is first in a series of articles discussing the relationship between compliance, security, and complexity.) As we work to add security to our systems we often use different security protocols. A protocol is The post Good Security Thrives in Simplicity appeared first on VMware vSphere Blog.

Thales, Telstra, Microsoft and Arduino working on scalable IoT security with GSMA standard

Thales and Telstra have collaborated with Microsoft and Arduino to implement a GSMA solution that would allow trusted and secure end-to-end communication between device and cloud in order to pave way for scalable security for connected IoT devices.As billions of devices collect, process and send data to the cloud within the IoT ecosystem, a variety of IoT services are executed. In order to enable security, the IoT cloud service must have absolute trust in data received from connected devices…

The Future of Cisco Security: Protecting What’s Now and What’s Next

Security should be a business enabler, so organizations can embrace the digital transformation. Cisco Security has been on a journey to give customers the best protection and simple user experience with Cisco SecureX.The post The Future of Cisco Security: Protecting What’s Now and What’s Next appeared first on Cisco Blogs.

Coronavirus: Dusting off Disaster Plans. Do they Still Work?

Many government agencies, as well as corporations, are responding to the coronavirus in different ways. Many have restricted corporate travel and have talked about “dusting off those disaster recovery plans” in order to cope with the current issues and events as well as everyday business and government operations.The problem with “dusting off a plan” is, you don’t know if it will really work? Or, if it is still applicable to your organization if you have not kept it up and tested it every …

Coronavirus prep could prompt better disaster recovery

Backup and disaster recovery systems often do not get the respect or budget that they deserve, and despite its potentially dire dangers, the coronavirus COVID-19 could actually help change that.Most things you would do to prepare for the disease are no different than what you should normally be doing, but concerns about the virus might help accelerate existing plans or to reconsider some long-standing policies.Prepare for a mobile workforceMost employees are already very mobile and do most o…

How Disaster Recovery as a Service Is Saving Small Businesses Time, Money and Worry

It’s an unpredictable world. According to the U.S. National Oceanic and Atmospheric Administration, each of the past five years has seen 10 or more disasters with losses exceeding $1 billion each. The annual average number of billion-dollar events between 2014 and 2018 is double the 38-year average established between 1980 and 2018, the agency says.Major weather events, meanwhile, are only one type of event that can cause lengthy, unpredictable disruption to business. There are also …

Pandemic impact report: Security leaders weigh in

In early March, as I prepared to fly home from a business trip to Seattle, we began hearing stories of U.S. businesses sending their workers home with the expectation that they may be working from home for weeks, if not months. CISOs started to share stories of employees exiting their offices with monitors under one arm and desktop computer systems under the other. With social and work restrictions imposed by governments and businesses in response to the novel coronavirus COVID-19, organiz…

FBI warns Zoom, teleconference meetings vulnerable to hijacking

As remote work surges amid the coronavirus pandemic, the FBI issued a public bulletin Monday warning Zoom and other video teleconferencing services may not be as private, or as secure, as users may assume. Use of Zoom and similar services has exploded in recent weeks as companies, schools, governments, and individuals increasingly turn to its teleconferencing as ways to keep businesses and classrooms afloat while sheltering in pace or working from home. However the shift also represents an op…

What is a deepfake? How to prepare for and respond to this cyber attack

As cyber criminals deploy more complex methods of hacking, using deepfakes to spread misinformation and “hack reality” have become more popular. This video, audio and/or text-based content is AI-generated and may be hard to discern from factual media. While no one can be totally safe from being deepfaked, heads of global companies or politicians may be especially appealing targets for hackers. Industry analyst and author Dr. Chase Cunningham joins Juliet to discuss how individuals and enterpr…

COVID-19 demonstrates the need for disaster recovery and business continuity plans

Join Today The coronavirus may put organizations at risk through short staffing or unavailable workers and services, but disaster recovery and business continuity plans can help sustain business operations. The need for a disaster recovery business continuity plan  is becoming more critical as the enterprise adjusts to the business disruptions caused by the coronavirus.   No, a virus in and of itself can't shut your company's systems, operations, or services down, but it can impact …

Build a SaaS disaster recovery plan for IT automation tools

From simple scripts to Ansible orchestration and infrastructure as code, IT automation continues to proliferate in the enterprise. And a lot of software tool sets IT teams use to achieve this automation are hosted in the cloud. As with any SaaS tool a business relies on for success, there should be a plan for if, or when, cloud-based IT automation software fails. When an IT system goes offline, policies and procedures normally exist to handle the loss. Disaster recovery environments and proc…

COVID-Themed Lures Target SCADA Sectors With Data Stealing Malware

A new malware campaign has been found using coronavirus-themed lures to strike government and energy sectors in Azerbaijan with remote access trojans (RAT) capable of exfiltrating sensitive documents, keystrokes, passwords, and even images from the webcam. The targeted attacks employ Microsoft Word documents as droppers to deploy a previously unknown Python-based RAT dubbed "PoetRAT" due to various references to sonnets by English playwright William Shakespeare."The RAT ha…

COVID-Themed Lures Target SCADA Sectors With Data Stealing Malware

A new malware campaign has been found using coronavirus-themed lures to strike government and energy sectors in Azerbaijan with remote access trojans (RAT) capable of exfiltrating sensitive documents, keystrokes, passwords, and even images from the webcam. The targeted attacks employ Microsoft Word documents as droppers to deploy a previously unknown Python-based RAT dubbed "PoetRAT" due to various references to sonnets by English playwright William Shakespeare."The RAT ha…

Ransomware attacks see 148% surge amid COVID-19

It's well-documented that threat actors will often take advantage of society's fears in order to pursue cybercrime, but new research from VMware Carbon Black suggests that the reality might be even worse than initially thought. The endpoint security vendor, which was acquired by VMware last for $2.1 billion, said ransomware attacks jumped 148% in March over baseline levels in February. "Notable spikes in attacks can also be correlated to key days in the COVID-19 news cycle, suggesting attack…

What is the cost of a data breach?

Data breaches and security incidents are becoming increasingly costly. Canadian lender Desjardins Group recent revealed it had spent C$70 million ($53 million) in the wake of a breach earlier in the year that exposed personal information of 2.9 million members. Manufacturer Norsk Hydro said the final bill for its crippling cyberattack could be as high as $75 million. British Airways and Marriott have had to add $100 million each onto the final cost of their incidents after falling foul of GD…

Are HPE SimpliVity backups real backups? – Part 3: HPE SimpliVity and third-party backup software.

In Part 1 of this series, I discussed how HPE SimpliVity backups work. In Part 2, I explained that HPE SimpliVity on its own is a reliable technology to protect your data. Unlike traditional snapshot technologies, HPE SimpliVity provides full backups and real data protection.In this article, I discuss when third party backup software can enhance data availability and when it is a good idea to add a technology partner to further improve the platform.I use HPE SimpliVity, do I need a third-part…

Are HPE SimpliVity backups real backups? – Part 2: Backups vs Snapshots?

In the preceding article, I discussed how HPE SimpliVity native backups work, provided an introduction to backup policies and more importantly, how HPE guarantees backups under 60 seconds.In this article, I’d like to tackle some comments I’ve heard about the speed of HPE SimpliVity Backups.Are HPE SimpliVity Backups Snapshots?The short answer is NO. HPE SimpliVity backups are NOT snapshots. Any hypervisor or array-based snapshots provide a changelog of the VM data that used to restore a VM to…

Are HPE SimpliVity backups real backups? – Part 1: How do Backups work?

I have previously discussed how HPE SimpliVity HCI solutions offer more than compute, storage, and storage networking. HPE SimpliVity converges IT infrastructure, enhances your security posture, and provides data services that include data efficiency, data protection, management, and mobility.Today, I’d like to cover data protection. It is one of the HPE SimpliVity services that other HCI platforms simply do not natively provide.This 3-part series explains HPE SimpliVity backups technology, h…

5 keys to supporting telework effectively and securely

The coronavirus crisis has greatly broadened the boundaries of the “enterprise” to an extent few could have imagined — in just a period of weeks. Suddenly, countless numbers of people are working from home and requiring access to company networks and data from remote locations. Companies are striving to maintain employee productivity, even as they shift to new working environments. The last thing they need to be doing is wasting workers’ time. This massive shift in work processes can have h…

Multifactor Authentication: The Next Battleground

X-Force Incident Response and Intelligence Services (IRIS) has responded to multiple security incidents where multifactor authentication (MFA) was not implemented—but where implementing MFA might have significantly reduced the impact of the incident. Such incidents have even included destructive malware attacks, resulting in millions of dollars in losses and the irreversible destruction of thousands of machines on the network. In fact, unauthorized use of credentials accounted for 29% of all…

What is pretexting? Definition, examples and prevention

Pretexting is form of social engineering in which an attacker tries to convince a victim to give up valuable information or access to a service or system. The distinguishing feature of this kind of attack is that the scam artists comes up with a story — or pretext — in order to fool the victim. The pretext generally casts the attacker in the role of someone in authority who has the right to access the information being sought, or who can use the information to help the victim.Pretexting has …

Threat Landscape Trends: Endpoint Security, Part 2

Being aware of what’s occurring on the threat landscape can be a valuable tool when it comes to defending your organization. If you’re well informed, that puts you in a good position to decide how best to protect your assets and allocate resources accordingly. While it’s important to stay up to date with the latest ground-breaking attack techniques and new threats, it’s equally important to keep abreast of the overall trends.The fact is that, for every novel technique discovered, there are …

Foreign hackers are targeting federal, state and local IT networks, feds warn

Written by Sean Lyngaas Oct 9, 2020 | CYBERSCOOP Foreign government-linked hackers have been exploiting old software vulnerabilities in an effort to access federal, state and local computer networks in ongoing activity, the FBI and the U.S. Cybersecurity and Infrastructure Security Agency warned Friday.The federal advisory, which did not point the finger at a particular foreign government, said that the malicious cyber activity had in some cases “resulted in unauthorized access to election…

5 Core Security Functions to Operationalize

Effective cybersecurity depends on three things: people, technologies, and processes. If even one of these pillars is lacking, all the investment in the world in the other two won't keep your organization safe. Unfortunately, too many businesses approach cybersecurity on an ad-hoc basis. They focus on putting out tactical fires—without building a strategic operation that can suppress these fires before they really ignite. Even when they've made massive investments in people, technologies, an…

How did your continuity plan stack up against Covid?

Business continuity plans have typically been similar to things like flood insurance policies or advance health care directives – something that you know is important, save in a drawer with other important items, and hope (or even presume) you'll never need to use them. 2020 is like the 500-year flood or emergency hospitalization – the time you open that drawer and need the things that are in there. As we head into the ninth month of the covid-19 pandemic, we've already looked at and made us…

How to protect backups from ransomware

Despite a recent decline in attacks, ransomware still poses significant threats to enterprises, as the attacks against healthcare organizations demonstrated this month. It is also becoming more capable. In particular, ransomware writers are aware that backups are an effective defense and are modifying their malware to track down and eliminate the backups.Ransomware targeting backupsRansomware will now delete any backups it happens to come across along the way, says Adam Kujawa, head of malwa…

Why disaster recovery is the last line of defense against ransomware

Criminals need two things to make a ransomware attack work for them; a penetrated IT security system, and inadequate or non-existent backup and disaster recovery. Sadly, this is an all too common state of affairs, as illustrated by Garmin, the latest high-profile victim of ransomware. At time of writing, the company is slowly restoring its GPS tracker and navigation services. But it is thought to have paid up to $10m to the ransomware attackers to gain access to the decryption key, according…

Double extortion ransomware will be a big theme in 2021

The coming 12 months will bring increasingly aggressive cyber crime activities as malicious actors continue to pivot their ransomware attacks from data encryption to data exfiltration, and with much of the workforce remaining at home until the second quarter at least, the cyber security challenges that were amplified by Covid-19 will persist for the time being. That is according to new research data compiled by data protection specialist Acronis, which has highlighted a number of key trends …

5 business continuity priority shifts for remote working

Here are the top 5 critical areas for your business continuity planning today and in the new normal.In 2020, we are all living through a world-changing event. Huge chunks of the workforce are on lockdown. Pretty much all of us, our colleagues, and our families are seriously affected in one way or another.It is a unique, new, and unsettling situation that not many of us would have predicted or foreseen. I just wanted to share some of the issues we've encountered from an IT perspective, how …

We are ready when you are! Contact Storcom today to discuss a disaster recovery solution for your company.

Contact A Team Member