Barely a month after the WannaCry ransomware virus made its presence felt around the world, today we learn of a new ransomware campaign known as Petya. This new virus is affecting computer networks using Microsoft Windows. It was first seen affecting systems in the Ukraine, but has quickly spread across other computer networks in Europe and further afield. In an advisory issued at 9:30 am this morning New Zealand’s government cyber safety Computer Emergency Response Team (Cert NZ) stated that they had no reports of Petya ransomware affecting New Zealanders.
Wow, last weekend was a stressful one for many in that over 200,000 people, across 10,000 organisations, in over 150 countries found out what it feels like to be a victim of ransomware. Should we be surprised ? Not really; security specialists have been pointing out for quite some time just how exposed we are. When we interviewed Peter Benson 3 months ago (Peter Benson 2017 security predictions) and asked him for his IT security predictions, he suggested that ransomware would grow by about 40 % in 2017 and more importantly he said we should expect a wider variety of ransomware.
By Ian Hight
In my first article on disaster recovery, I identified the two key objectives the business needs to set for its IT recovery strategy: the Recovery Point Objective (RPO) and Recovery Time Objective (RTO). This was followed by an article exploring the key elements of a Business Continuity Plan (BCP), which includes a Disaster Recovery (DR) plan for the IT systems. I now drill down into the key elements of DR for an organisation.
IBM AIX customers have more in common with each other than you might think, despite a multiplicity of use cases, IT environments and industry sectors using the platform, the market is telling us they all face the same challenges.
Firstly, what is SAS IT's pedigree in the IBM Power Systems market? We manage in excess of 100 systems, both AIX and IBMi, this makes us one of the largest IBM Power MSP's in Australasia.
By Ian Hight
Today you can buy almost anything from the cloud. Applications, back-up and DR and, now, the organisation's entire IT infrastructure.
This environment can be hosted, managed and serviced somewhere other than on its own premises.
By Ian Hight
Introducing the concept of virtualisation for storage systems and set out the key components of the storage virtualisation plan.
I will also drill down into the assessment that provides the foundation for executing a storage virtualisation project.