It’s easy to get a full backup of an ASA by using ASDM and there are advantages of this method over using CLI. Here’s a walkthrough of how to obtain…
A Disaster Recovery plan should be an integral part of any business’s IT strategy. With security breaches, attacks, and outages on the rise, you should have a plan and keep…
I have been recently spending a lot of time with a few clients that have been infected with Crypto locker or the many variants. Crypto Locker, sometimes called Crypto wall,…
It finally happened. Somehow, my computer (complete with Anti-virus and anti-malware products) was attacked by ransomware. Ransomware, if you don’t know, encrypts documents (office, pictures, pdf, etc) on your computer…
Fast Backup and Recovery of your Virtual Machines Many organizations have gone to some level of a virtual infrastructure. With this change many organizations are wondering what the best solution…