What’s The Difference Between Data Center Redundancy 2N vs. N+1

Data Center Redundancy

Since the dawn of the modern computer age, data centers have been the foundation for building our computing facilities and networking equipment. Data centers are responsible for storing, collecting, processing, and distributing data. They represent any company’s backbone that relies on applications, networking services, or data to deliver products and services to its customers. Because […]

Data Breaches Are A Growing Epidemic: No One Is Safe

wawa data breach

For the past few years, there has been a constant stream of data breaches that have hit the headlines, ranging from the theft of medical information, account credentials, corporate emails, and internal sensitive enterprise data.  When a data breach occurs, companies will usually haul in third-party investigators, notify regulators, promise to do better, and give […]

Discover How Volico Can Protect Your Business Against Microsoft’s RDP BlueKeep Exploit

Windows bug BlueKeep

For the may 2019 security patch release, Microsoft included a patch for a RCE (remote command exec) bug in the remote desktop service (RDP). This was to fix an exploit where an unauthenticated attacker would send “core-system” malformed and malicious RDP messages to the target server using system-level message service to the MS_T120 protocol of […]

Essential Questions to Ask When Developing a Business Continuity Plan

Designing Your Business Continuity Plan

Developing a business continuity plan is essential in this age of instant connectivity and will give you the peace of mind that comes with knowing you are prepared for anything. With a business continuity plan, you can ensure that, in times of downtime and power outage, your information and data will be safe and secure. […]

The Growing Trend of Data Protection as a Service

The Growing Trend of Data Protection as a Service

As business needs grow and evolve, so does the level of the services that they require to operate effectively in a technology-driven world. Due to the increased growth in cloud services’ popularity, many businesses are looking to enhance their hosted services to give them access to better benefits such as higher scalability, management, and recovery […]

How Does GDPR Compare to HIPAA?

GDPR Compare to HIPAA

The General Data Protection Regulation (GDPR) of the EU and the Health Insurance Portability and Accountability Act (HIPAA) of the United States are two critical government acts that were created to protect personal and sensitive information and data. These two pieces of regulative guidelines have contributed a considerable amount to the global data security field. […]

What HIPAA Compliant Means for Data Centers?

Understand how data centers can help your health company meet its HIPAA compliance requirements

HIPAA is an acronym for Health Insurance Portability and Accountability Act of 1996. It is a U.S. law designed to protect the safety of medical information that is transmitted electronically. The law began as a way to help patients keep insurance if they lose their job or change jobs. HIPAA also helps reduce medical costs […]

The Difference between Real and Fake Ransomware

Understand how to manage real and fake ransomware

Standard ransomware is the deliberate sabotage of your computer files and data by outsiders. The criminals in no uncertain terms tell you that your information has been encrypted, making it unusable. They tell you that you have a limited time, such as 48 to 72 hours, to pay them or your files will be forever […]

Ransomware as-a-Service (RaaS) Explained

Ransomware as-a-Service is making cyber crime all too easy. Now, criminals don’t have to create this malicious type of software. They can essentially use it for a minimal cost and pay the developers a cut, a percentage. Ransomware is computer software that criminals maliciously installed onto computers, cellphones, and other devices. The software typically enters […]

Instructive Lesson From The Amazon S3 Outage

Amazon cloud computing S3 Outage

On Tuesday, February 28th, 2017, an Amazon employee made a typo during a routine billing system repair and, rather than taking only a few servers offline, instead took down a significant (but still unspecified) number of the nearly 150,000 unique websites and apps hosted or supported by the Amazon cloud computing S3 service. Affected sites […]