Recovering From a Ransomware Attack Seen Through 1 Interesting Analogy

As a solutions architect, the most important advice I give to my clients when designing new ransomware protection and recovery solutions is “Transform your data into a couch!” The couch ransomware analogy To understand what I mean by this seemingly silly statement, consider the following scenario: One day, you answer a phone call from a [...]

Sirius Joins Forces with Former Intermountain Healthcare CISO

Sirius makes a big gain in their Healthcare Security team with the onboarding of former Intermountain Healthcare CISO, Karl West. Based in Salt Lake City, Utah, Intermountain Healthcare is a not-for-profit healthcare system with more than 41,000 caregivers and an integrated delivery network of 23 hospitals and 300 clinics. Under West’s guidance, the healthcare system [...]

Brew a Stronger Data Protection and Disaster Recovery Plan

Good ideas start with coffee, but how can you be sure you will be able to use them and your organization’s valuable data without disaster recovery or data protection? In today’s fast paced business world, data needs to be accessible 24/7. When you are unprepared and mission-critical machines go down, you risk hours of data [...]

Sirius Case Study: A Recovery That Began Before a RobinHood Ransomware Attack

The odyssey began with a panicked phone call. A Sirius enterprise client had just experienced complete data loss. The RobinHood ransomware virus infected every Windows instance in his environment. All Windows infrastructure data was impacted, including data for web servers, accounting, claims, payroll, human resources and more. The Sirius solution architect—who designed and implemented the [...]

Why 2020 Will Be the Year of IT Resilience

Why is 2020 expected to be the Year of IT Resilience? Because today more than ever, organizations large and small are demanding: Decreased downtime: How does one address the exponential costs associated with downtime? Cyber-resiliency: The constant growth and ever-evolving nature of threats is staggering. Continuous data protection: Snapshot-style solutions leave gaps in operational efficiencies [...]

5 Ways to Get Wise on Business Email Compromise (BEC)

NPR’s All Things Considered recently ran a story about the persistence of email cybercrimes and the techniques used by cybercriminals to steal money from their victims. This year alone, the U.S. Department of Justice, in collaboration with other government departments, seized nearly $3.7 million stolen through BEC schemes. Scammers still use the oldest trick in [...]