The Importance of Back-Up & Disaster Recovery (BDR)


When do you buy an umbrella?  Before it rains.    -Ancient Tech Proverb

Many of you probably read or heard about the  Ransomware attack on Hollywood Presbyterian Medical Center. This happens far more frequently than it is publicized. Our team at The Tech Consultants is constantly working proactively to defend your IT infrastructure against these attacks, which are becoming more sophisticated every day. One of the best ways to ensure recoverability from potential loss of data is to implement a robust Back-up & Disaster Recovery (BDR) system.

Cybercriminals are continuously evolving Malware to get around IT defenses. Our team is constantly updating the multiple layers of security used to protect our client’s network against malware & ransomware. For example, we install, manage and update multiple and sophisticated anti-virus and anti-malware systems. We also configure, manage and maintain our client’s firewalls, before any Malware makes it’s way to your critical IT Infrastructure. In spite of these efforts, malware is constantly changing, and even the best efforts can’t always stop a brand new virus.  For example, one of our clients was recently infected, even though all best practices were followed.  Thanks to the BDR system we had in place, recovery was instant. Without the BDR, the client could have been subjected to days of expensive down time, as well as having to pay a ridiculous sum of money to regain access to their files.

We provide a range of BDR solutions, to meet any budget. All BDR solutions include automatic off-site storage as well as on-site, disk-based storage. For mission-critical infrastructure that can never be down, we offer BDR systems that includes real-time replication of  your entire computing infrastructure. If you don’t already have a BDR system in place, we can work with your organization to help implement the best and most comprehensive BDR system for your business and budget. These safe, secure, reliable and tested Disaster Recovery / Backup Systems will give you peace of mind knowing that your data is always safe and accessible.

It’s far better than shelling out $17,000* to a cybercriminal. Call us to discuss how we may help you avoid harmful downtime and unnecessary costs. (818) 206-2149.

*The original ransom was 3.6 Million Dollars.

Also: A US School Agreed to Pay $8,500 to get rid of Ransomware.

Beat Online Scams & Phishing Attacks This Holiday Season!

This time of year is easy-pickings for cybercriminals eager to exploit the large volume of E-commerce purchases. 64% of organizations report an increase in cybercrime on Cyber Monday, and phishing links go up as much as 336% around and after Thanksgiving.


Here are 6 ways to protect against cybercriminals: 

1. Be wary of e-mails with offers “too good” to be true. 

One of the oldest methods for perpetrating online scams is embedding links in false e-mails. Perpetrators will attempt to trick you with links to unbelievable offers at well established sites, like Best Buy and Amazon. DO NOT CLICK THESE LINKS. Open your Web Browser, enter the URL to the site offering these discounts and search for the deals manually. If you can’t find the offer, it’s likely a scam.

2. Visit and shop only on the web sites you trust.

Many retailers will offer significant discounts – sometimes up to 50% or more – it is still safer to work with businesses you have purchased from before.

3. Purchase only on “S”ecure sites.

Only use your credit card on sites with SSL (secure sockets layer) security. To determine this, check to see that the URL for the page begins with ” https:// ” and not just ” http:// ”  That “s” lets you know the site is secure. Most browsers will also show a lock icon somewhere in the browser window.

4. Make your purchase with credit cards only.

Avoid non-credit or wire transfer payment methods. Many credit providers have a “zero liability” policy meaning you’re safe from the charges even if a hacker gets a hold of your credit card info. Additionally, federal laws allow you to dispute an item on your credit card bill, if you don’t receive your purchase.

5. Use different username-password combinations across multiple sites. 

Cybercriminals harvest user name and password combinations, trade this information freely and try the combinations against multiple sites until they have access to your most personal accounts. It is a few more steps to create unique username-password combinations but well worth it!

6. Create a specific email account for online shopping. 

All major e-mail services like Gmail and Yahoo allow you to create free e-mail accounts. Create an account solely for the purpose of online shopping. This will reduce SPAM to your primary account and and prevent cybercriminals from accessing and obtaining sensitive data shared there.