How prepared is your business for a disaster?

Disasters can come in many forms and they can happen when you least expect it. Only 6% of companies that suffer catastrophic data loss survive while 43% never reopen and 51% close within 2 years of the disaster. 93% of the companies that did not have their data backed up in the event of a disaster went out of business. (Best’s Underwriting Guide)
Protect your business from:
  • Fires
  • Floods
  • Power Outages
  • Hurricanes
  • Human Error
  • Thieves & Hackers
  • Viruses & Worms
The important thing is to be prepared so critical data can be recovered and your organization can become operational as soon as possible. A disaster recovery plan is essential in these cases. A well-planned backup and recovery solution plays a crucial role in minimizing downtime in a disaster and preventing data loss in the event of server or application failure. What makes a true disaster recovery solution is the ability to restore full systems quickly, in a matter of hours or even minutes, on available computing resources which may be local, but may also be remote if the situation dictates. Our cost-effective solutions can be combined with your existing disaster recovery plan to complement or enhance it as needed. Our expert staff will design a comprehensive solution that assures the availability, security and recoverability of your infrastructure. Knowing that your data is backed up locally and off-site will make it easier for you to concentrate entirely on your business.


Can You Run Your Business Without Your Data?

Branch Technologies recommends using a hybrid backup solution to ensure complete protection.


RSS Security Threat News

  • COINHOARDER: Tracking a Ukrainian Bitcoin Phishing Ring DNS Style February 14, 2018
    This post is authored by Jeremiah O'Connor and Dave Maynor with contributions from Artsiom Holub and Austin McBride.  Executive Summary Cisco has been tracking a bitcoin theft campaign for...
  • Microsoft Patch Tuesday – February 2018 February 13, 2018
    Microsoft Patch Tuesday - February 2018 Today Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month's advisory...
  • Olympic Destroyer Takes Aim At Winter Olympics February 12, 2018
    The Winter Olympics this year is being held in Pyeongchang, South Korea. The Guardian, a UK Newspaper reported an article that suggested the Olympic computer systems suffered technical issues during...
  • Targeted Attacks In The Middle East February 7, 2018
    This blog post is authored by Paul Rascagneres with assistance of Martin Lee. Executive Summary Talos has identified a targeted attack affecting the Middle East. This campaign contains the following...
  • Flash 0-Day In The Wild: Group 123 At The Controls February 2, 2018
    The 1st of February, Adobe published an advisory concerning a Flash vulnerability (CVE-2018-4878). This vulnerability is a use after free that allows Remote Code Execute through a malformed Flash object....
  • Ransom Where? Malicious Cryptocurrency Miners Takeover, Generating Millions January 31, 2018
    The Dark Side of the Digital Gold Rush This post was authored by Nick Biasini, Edmund Brumaghin, Warren Mercer and Josh Reynolds with contributions from Azim Khodijbaev and David Liebenberg.
  • 2017 in Snort Signatures. January 29, 2018
    2017 was an eventful year for cyber security with high profile vulnerabilities that allowed self-replicating worm attacks such as WannaCry and BadRabbit to impact...
  • Vulnerability Spotlight: Walt Disney Per-Face Texture Mapping faceInfoSize Code Execution Vulnerability January 26, 2018
    This vulnerability was discovered by Tyler Bohan of Cisco Talos. Executive Summary Walt Disney PTEX is an open source software application maintained by Walt Disney Animation Studios. It is...
  • SamSam – The Evolution Continues Netting Over $325,000 in 4 Weeks January 22, 2018
    Talos have been working in conjunction with Cisco IR Services on what we believe to be a new variant of the SamSam ransomware. This ransomware has been observed across multiple industries including Government, Healthcare and ICS. These attacks do not appear to be highly targeted, and appear to be more opportunistic in nature. Given SamSam’s victimology its […]
  • The Many Tentacles of the Necurs Botnet January 18, 2018
    This post was written by Jaeson Schultz. Introduction Over the past five years the Necurs botnet has established itself as the largest purveyor of spam worldwide. Necurs is responsible for emailing massive amounts of banking malware, ransomware, dating spam, pump-n-dump stock scams, work from home schemes, and even cryptocurrency wallet credential phishing. Necurs sends so much […]