disaster recovery

Home/Tag: disaster recovery

5 Backup Software (for Home/Personal Computer)

2020-09-13T12:15:34+00:00Categories: Backup|Tags: , , , , , , , , , , , , , , , , , |

In this post, we are going to introduce you to five powerful backup software. All of these applications are suitable for home and personal computers.     Acronis True Image is one of best backup tools. Acronis official website This software has a good desktop interface and working with it is not very complicated. [...]

What’s ISCM? (NIST SP 800-137)

2020-09-02T05:40:16+00:00Categories: Network Administration, Network Security, Standards and Agreements|Tags: , , , , , , , , , , , |

First of all, it's better to talk about what NIST is and why the content published by NIST is important. The National Institute of Standards and Technology (NIST) is a non-regulatory agency of the United States Department of Commerce. This Institute develops technology, metrics, and standards to drive innovation and economic competitiveness at U.S.-based organizations [...]

Amazon VPC

2020-09-02T05:40:25+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , |

Amazon Virtual Private Cloud (VPC) is a commercial cloud computing service that provides a virtual private cloud, by provisioning a logically isolated section of Amazon Web Services (AWS) Cloud. This service enables customer to launches AWS resources into a virtual network that he/she/it has defined. So, a customer has complete control over his/her/its virtual networking [...]

Cryptolocker Attack

2020-09-24T12:42:32+00:00Categories: Network Security|Tags: , , , , , , , , , , , , |

The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014. It is believed that the operators of CryptoLocker successfully extorted a total of around $3 million from victims of the trojan. It propagated via infected email attachments, and via an existing Gameover ZeuS botnet. [...]

Offsite Backup

2020-09-02T05:32:47+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , |

No matter how efficient a computer system appears to be, there is always the possibility of a malfunction wiping out valuable data. For this reason, many companies have set up backup systems, designed to recover lost data. It is very important that an organization have at least two backup. a backup in local (onsite backup) [...]

Server virtualization

2020-09-02T05:46:42+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , , |

Computer network administrators usually dedicate each server to a specific application or task. In most cases each application / task needs its own dedicated machine. There are a couple of problems with this approach, though. One is that it doesn't take advantage of modern server computers' processing power. Many of these servers sit idle as the [...]

Disaster Recovery and Business Continuity

2020-09-23T13:21:48+00:00Categories: Computer & Network Concepts, Network Administration|Tags: , , , , , , |

How an organization responds to a cyber security incident or any other event that causes the loss of operations or data. We have provided detailed training on these two topics in the CISSP Training Course. In recent years, Disaster Recovery, and business continuity have more important role in enterprise computing budgets. Disaster recovery is the [...]

Cyber Security

2020-09-23T13:18:18+00:00Categories: Certified Ethical Hacker, Network Security|Tags: , , , , , , , , , |

Cyber security is the practice of protecting systems, networks, and programs from digital attacks. It's also known as information technology security or electronic information security. Cyber-attacks are often aimed at accessing, changing, or destroying sensitive information. Final goal of these attacks is extorting money from users, or interrupting normal business processes in organizations, governments and [...]

Go to Top