Discover How Volico Can Protect Your Business Against Microsoft’s RDP BlueKeep Exploit

Windows bug BlueKeep

For the may 2019 security patch release, Microsoft included a patch for a RCE (remote command exec) bug in the remote desktop service (RDP). This was to fix an exploit where an unauthenticated attacker would send “core-system” malformed and malicious RDP messages to the target server using system-level message service to the MS_T120 protocol of […]

The Ins and Outs of Network Attached Storage

What are the Pros and Cons of NAS and SAN Storage Solutions?

Whether you are looking for residential or business data storage solutions, there are many from which to choose. What you select will depend upon your storage and accessibility needs, your budget, and your ability to manage your system in-house. What is NAS (Network Attached Storage?) Network Attached Storage, or NAS, is a computer data storage […]

Storage Tiering and Cost Savings for Data Backup and Recovery


No matter where you look, the cost of the newest technology is rising for businesses. While older tech tends to plummet in price faster, the latest and greatest brings such complexity to the table that costs tend to run high. Due to the rising cost, industries are now learning to become more efficient in how […]

Essential Questions to Ask When Developing a Business Continuity Plan

Designing Your Business Continuity Plan

Developing a business continuity plan is essential in this age of instant connectivity and will give you the peace of mind that comes with knowing you are prepared for anything. With a business continuity plan, you can ensure that, in times of downtime and power outage, your information and data will be safe and secure. […]

The Growing Trend of Data Protection as a Service

The Growing Trend of Data Protection as a Service

As business needs grow and evolve, so does the level of the services that they require to operate effectively in a technology-driven world. Due to the increased growth in cloud services’ popularity, many businesses are looking to enhance their hosted services to give them access to better benefits such as higher scalability, management, and recovery […]

The Most Common Causes of Hard Drive Failure

It happens to us all eventually. Things seem to be clicking along fine, and then, out of nowhere, your computer refuses to boot up. Maybe you’ve noticed some cryptic error messages that don’t seem actually to relate to any part of your system. Hard drive failure can look like a nightmare without proper planning, a […]

RTO & RPO: Know the Differences

Know the Differences between Recovery Time Objective and Recovery Point Objective

Disaster Recovery: The Basics How well would your company fare if your area was struck by a natural disaster tomorrow? Would your business survive? Would your business operations be able to be restored so that your company could get back to normal? In a world where cyber-attacks and natural disasters are on the rise, it […]

What HIPAA Compliant Means for Data Centers?

Understand how data centers can help your health company meet its HIPAA compliance requirements

HIPAA is an acronym for Health Insurance Portability and Accountability Act of 1996. It is a U.S. law designed to protect the safety of medical information that is transmitted electronically. The law began as a way to help patients keep insurance if they lose their job or change jobs. HIPAA also helps reduce medical costs […]

Block Storage vs. Object Storage Services

Block Storage vs. Object Storage Services

Data centers are useful for storing large amounts of data. A common data storage question is whether the data should be stored in blocks or in objects. There are benefits and disadvantages to both types of storage. Blocking Storage A block, sometimes known as a physical record, is a bit sequence, that contains a whole […]

Ransomware as-a-Service (RaaS) Explained

Ransomware as-a-Service is making cyber crime all too easy. Now, criminals don’t have to create this malicious type of software. They can essentially use it for a minimal cost and pay the developers a cut, a percentage. Ransomware is computer software that criminals maliciously installed onto computers, cellphones, and other devices. The software typically enters […]