zero trust architecture

Building a Zero-Trus...

Learn how to build a zero-trust architecture for cloud data environments using identity, microsegmentation, governance, and automation to reduce risk and costs.

cloud data protection feature

Advanced Techniques ...

Cloud data protection best practices: encrypt data, keep backups immutable and air-gapped, use CDP, and automate testing to beat ransomware.

vmware-license-feature

VMware License: Top ...

Understand VMware license changes in 2025 under Broadcom: subscriptions replace perpetuals, 72-core minimums, pricing, audits, compliance. Get help from OTAVA.

The Most Aggressive Types of Ransomware Targeting Healthcare in 2025

The Most Aggressive ...

Discover the most aggressive types of ransomware targeting healthcare in 2025. Learn how to protect systems and patient data with layered strategies.

The biggest data bre...

As we did in 2016, we’re rounding up the biggest data breaches of 2017. What have we learned as a result, and what can companies...

Ransomware attacks 7...

A ransomware attack spread across 74 countries on Friday, throughout Europe, the Middle East and Asia. The attack hurt Britain’s healthcare system, forcing some hospitals...

Ransomware and healt...

Ransomware was officially a billion dollar crime in 2016, with more than 4,000 attacks since Jan. 1 and at least 25 variants of ransomware discovered. Researchers have predicted...

Football fever comes...

Football is a pretty hot topic around our water coolers this morning. How about yours? In Ann Arbor, home of our corporate headquarters and two...

Tales from the disas...

After 30 years in the disaster recovery field, Lance Thompson has some good stories to tell. The founder and president of Baseline Data Services shared...

CIS Cyber Alert Rele...

Last week I wrote about CryptoLocker in Offsite Backup: Thwarting the Profitable Encryption Malware Cryptolocker, the well-known malware that is categorized as ‘ransomware’ – it...