Macrium company logo
State and Local Government Cybersecurity Risks

State and local governments are vulnerable to cybercriminal activity as “they collect, process, store, and transmit vast amounts of sensitive data.” The wrong hands can weaponize and misuse data. In 2020, hackers carried out 79 individual ransomware attacks against U.S. government organizations. It cost downtime and recovery of nearly $18.88 billion. Clearly, ransomware is pervasive. The attack suspended “municipal operations, ultimately disrupting infrastructure services for 911 systems, utilities, and payment platforms with state and local governments.” ...

Read more
Why you should keep your data cool this summer

Here in the northern hemisphere, summer has rolled round again, bringing record temperatures across Europe and North America with it. While a cold shower or an icecream might be enough to cool us down, things aren’t so simple for the devices that we trust to store our data. Have you ever wondered why data centres are so cold? The answer is slightly more complex than “to keep the IT people cool”....

Read more
The Federal Government and Cybersecurity Risks

Infiltrating government data is highly treacherous and illegal. Cybercriminals may steal government files, share and disclose private information, and disrupt politics to disunify the country. The Cybersecurity and Infrastructure Security Agency, under the United States Department of Homeland Security, defends the government against cyber threats. However, much of the U.S. government tends to have a reactive approach to data management and security. Since data supports government work, cybersecurity risks are high....

Read more
Backups and WiFi: The do's and don'ts

Wi-Fi is a set of protocols that enable wireless networking, these protocols are defined in the 802.11 IEEE (Institute of Electrical and Electronics Engineers) standard. Although this goes without saying: Wi-Fi is extremely convenient, especially in homes where it may not be practical to connect devices together using cables. This means that backups to network locations in the home and some offices are often performed over Wi-Fi. While this may be more convenient, there are several downsides when compared to a backup performed over a cabled network connection. ...

Read more
Macrium MultiSite and Security

Macrium MultiSite enables you to monitor and manage multiple instances of Macrium Site Manager using one web interface. This web interface is hosted by us using Microsoft Azure virtual machines. Information from the Site Managers is sent securely over an insecure network, the internet, to the virtual machines. This begs the question, how do we keep your information secure from Site Manager to MultiSite?...

Read more
Restoring an image remotely using Macrium Site Manager

Macrium Site Manager enables partitions/disks to be restored easily and rapidly back to their original location. To restore a partition/disk to a different location, e.g. to a new disk or bare metal restore, then the image will need to be restored manually using the Site Manager Agent or rescue media respectively. ...

Read more
How to implement the 3-2-1 backup strategy

Statista.com reported that in 2021 an estimated 79 zettabytes of data was created, captured, copied, and consumed globally; for reference, one zettabyte is equivalent to a billion terabytes. The amount of data that we create grows every year, as a result: so does the amount of data we lose. Data disasters do happen. ...

Read more
How to avoid backup bad luck this Friday the 13th

Many things are associated with bad luck: black cats, breaking a mirror, Friday the 13th and data integrity errors, just to name a few. The superstitions around black cats, broken mirrors, or Friday the 13th are unfounded but data integrity errors are definitely something to be scared of. This is, perhaps, never truer than with a backup file. Since this day has been inextricably linked with bad luck, we’re sharing some tips so that you don’t have to roll the dice on your data’s integrity....

Read more