About John Brewer

This author has not yet filled in any details.
So far John Brewer has created 30 blog entries.

Securing Backups

Securing Backups Backups are heinously important. Keeping good data backups can be the difference between a data loss incident being a day-long inconvenience or an organization-killing disaster. One thing that isn't as often discussed, though, is securing those backups. We've talked at length previously about the importance of backups against physical disasters like fires and

2021-01-12T19:56:45-04:00January 12th, 2021|Uncategorized|

Hard Disk Failure Rates

Hard Disk Failure Rates This week we had an unfortunate series of coincidences that led us to take a close look at our backup and restore practices. To give you a little high-level insight into operations at Deep Core Data, we run a number of virtualized environments for different customers. In these environments, we do

2020-12-16T15:14:44-04:00December 16th, 2020|Uncategorized|

Data Loss Protection

Data Loss Protection At Deep Core Data, we're often evaluating new technologies that are on the cutting edge of what's available. More often than not, these tools are either too immature or too specialized to be broadly useful to our customer base. If there's a real need for what they do, though, they will tend

2020-12-02T13:22:11-04:00December 2nd, 2020|Uncategorized|

Ransomware Rise

Ransomware Rise In the past few months, we've seen a pronounced uptick in cyber attacks of all stripes. However, the most directly destructive are ransomware attacks. For the blessedly uninitiated, a ransomware attack is when a piece of malware finds its way onto your computer and sets about encrypting all of your files. Once it

2020-10-21T12:39:15-04:00October 21st, 2020|Uncategorized|

Virtual Workstations Improve Data Security

Virtual Workstations Improve Data Security Deep Core Data serves a number of organizations with strict data management policies – with files and data that can't be accessed or removed from the sites they live on.  So how do you do remote work at a site like that?  Virtual workstations. Legal firms, accounting firms, doctor's offices,

2020-10-07T16:15:54-04:00October 7th, 2020|Uncategorized|

Phishing and Spoofing Schemes on Office 365

Phishing and Spoofing Schemes on Office 365 In the past year or so, we've seen an uptick in a particular methodology of international cybercriminals preying on US and Canadian businesses. Knowing what their tactics are can help keep you and your customers safe.The start of the attack is usually when the criminals obtain the Office

2020-09-23T11:01:45-04:00September 23rd, 2020|Uncategorized|

Space Probe Mode

Space Probe Mode In November 2006, the Mars Global Surveyor had been orbiting the Red Planet for over nine years. On the second of November, the mission team at NASA ordered the spacecraft to reorient a solar panel, and suddenly the decade-old spacecraft lost contact with Earth forever. A small error introduced months earlier, when

2020-09-09T14:23:17-04:00September 9th, 2020|Uncategorized|

On-Prem vs Cloud: Cost vs Uptime

On-Prem vs Cloud: Cost vs Uptime Over the past two weeks, I've had several existing and potential customers talk to me about moving on-prem systems to the cloud, and pulling cloud systems back to on-prem. I want to talk a little bit about what the two major forces are that are pushing and pulling on

2020-08-26T17:19:13-04:00August 26th, 2020|Uncategorized|


Cottage-Location The gig economy has come to IT. Long ago, in the halcyon days of the 1990's, when people still distinguished between the World Wide Web and the Internet, it was not uncommon for websites, even relatively high-traffic websites, to be run from a computer in a person's house. Websites were simpler back then, usually

2020-08-12T17:08:50-04:00August 12th, 2020|Uncategorized|