How prepared is your business for a disaster?


Disasters can come in many forms and they can happen when you least expect it. Only 6% of companies that suffer catastrophic data loss survive while 43% never reopen and 51% close within 2 years of the disaster. 93% of the companies that did not have their data backed up in the event of a disaster went out of business. (Best’s Underwriting Guide)
 
Protect your business from:
  • Fires
  • Floods
  • Power Outages
  • Hurricanes
  • Human Error
  • Thieves & Hackers
  • Viruses & Worms
The important thing is to be prepared so critical data can be recovered and your organization can become operational as soon as possible. A disaster recovery plan is essential in these cases. A well-planned backup and recovery solution plays a crucial role in minimizing downtime in a disaster and preventing data loss in the event of server or application failure. What makes a true disaster recovery solution is the ability to restore full systems quickly, in a matter of hours or even minutes, on available computing resources which may be local, but may also be remote if the situation dictates. Our cost-effective solutions can be combined with your existing disaster recovery plan to complement or enhance it as needed. Our expert staff will design a comprehensive solution that assures the availability, security and recoverability of your infrastructure. Knowing that your data is backed up locally and off-site will make it easier for you to concentrate entirely on your business.

 

Can You Run Your Business Without Your Data?

Branch Technologies recommends using a hybrid backup solution to ensure complete protection.

 
hybrid-backup

RSS Security Threat News

  • Microsoft Patch Tuesday – December 2017 December 12, 2017
    Today, Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month’s advisory release addresses 34 new vulnerabilities with 21 of them rated critical and 13 of them rated important. These vulnerabilities impact Edge, Exchange, Internet Explorer, Office, Scripting Engine, Windows, and more. In […]
  • Threat Round Up for Dec 01 – Dec 08 December 8, 2017
    Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between December 01 and December 08. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]
  • Vulnerability Spotlight: TALOS-2017-0393 / CVE-2017-2886 – ACDSee Ultimate 10 Remote Code Execution Vulnerability December 8, 2017
    Overview Talos has discovered a remote code execution vulnerability in the ACDSee Ultimate 10 application from ACD Systems International Inc. Exploiting this vulnerabilities can potentially allow an attacker to gain full control over the victim’s machine. If an attacker builds a specially crafted .PSD (Photoshop) file and the victim opens it with the ACDSee Ultimate […]
  • The Mutiny Fuzzing Framework and Decept Proxy December 7, 2017
    This blog post is authored by James Spadaro of Cisco ASIG and Lilith Wyatt of Cisco Talos. Imagine a scenario where you, as a vulnerability researcher, are tasked with auditing a network application to identify vulnerabilities. By itself, the task may not seem too daunting until you learn of a couple conditions and constraints: you […]
  • Recam Redux – DeConfusing ConfuserEx December 6, 2017
    Overview This report shows how to deobfuscate a custom .NET ConfuserEx protected malware. We identified this recent malware campaign from our Advanced Malware Protection (AMP) telemetry. Initial infection is via a malicious Word document, the malware ultimately executes in memory an embedded payload from the Recam family. Recam is an information stealer. Although the malware […]
  • Vulnerability Walkthrough: 7zip CVE-2016-2334 HFS+ Code Execution Vulnerability November 30, 2017
    This blog post was authored by Marcin Noga of Cisco Talos. Introduction In 2016 Talos released an advisory for CVE-2016-2334, which was a remote code execution vulnerability affecting certain versions of 7zip, a popular compression utility. In this blog post we will walk through the process of weaponizing this vulnerability and creating a fully working […]
  • ROKRAT Reloaded November 28, 2017
    This post was authored by Warren Mercer, Paul Rascagneres and with contributions from Jungsoo An. Earlier this year, Talos published 2 articles concerning South Korean threats. The first one was about the use of a malicious HWP document which dropped downloaders used to retrieve malicious payloads on several compromised websites. One of the website was a compromised government website. We […]
  • Talos Wins The 5th Volatility Plugin Contest With Pyrebox November 22, 2017
    Talos has won this year’s 5th Volatility plugin contest with Pyrebox. Volatility is a well-known open-source framework designed to analyse operating system memory. The framework exists since 2007, for the previous 5 years they have run a plugin contest to find the most innovative, interesting, and useful extensions for the Volatility framework. Pyrebox is an open-source Python scriptable […]
  • This Holiday Season – Buy One IoT Device, Get Free CVEs November 20, 2017
    As the Internet of Things gains steam and continues to develop, so are adversaries and the threats affecting these systems. Companies throughout the world are busy deploying low cost Internet-connected computing devices (aka the Internet of Things) to solve business problems and improve our lives. In tandem, criminals are developing their methods for abusing and […]
  • Threat Round Up for Nov 10 – Nov 17 November 17, 2017
    Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 10 and November 17. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]