About John Brewer

This author has not yet filled in any details.
So far John Brewer has created 32 blog entries.

Full IT Services

Full IT Services “Managed IT” seems like something larger companies use. It invokes images of high-priced consultants, enormous bills, and an impersonal helpdesk seat warmer hiding behind a small of forest of dialog trees. At Deep Core Data, we've found a better way for our small and medium business customers. First, we don't just provide

2021-04-07T18:26:08-04:00April 7th, 2021|Uncategorized|

Federated Infrastructure: How The Oldest Technologies Are The Most Reliable

Federated Infrastructure: How The Oldest Technologies Are The Most Reliable In the past year we've seen a number of huge tech companies starting to run afoul of world governments. Google, TikTok, Facebook, and others have all found themselves facing bans or restrictions of service in one country or another. The ability to communicate with people

2021-02-24T17:30:09-04:00February 24th, 2021|Uncategorized|

Securing Backups

Securing Backups Backups are heinously important. Keeping good data backups can be the difference between a data loss incident being a day-long inconvenience or an organization-killing disaster. One thing that isn't as often discussed, though, is securing those backups. We've talked at length previously about the importance of backups against physical disasters like fires and

2021-01-12T19:56:45-04:00January 12th, 2021|Uncategorized|

Hard Disk Failure Rates

Hard Disk Failure Rates This week we had an unfortunate series of coincidences that led us to take a close look at our backup and restore practices. To give you a little high-level insight into operations at Deep Core Data, we run a number of virtualized environments for different customers. In these environments, we do

2020-12-16T15:14:44-04:00December 16th, 2020|Uncategorized|

Data Loss Protection

Data Loss Protection At Deep Core Data, we're often evaluating new technologies that are on the cutting edge of what's available. More often than not, these tools are either too immature or too specialized to be broadly useful to our customer base. If there's a real need for what they do, though, they will tend

2020-12-02T13:22:11-04:00December 2nd, 2020|Uncategorized|

Ransomware Rise

Ransomware Rise In the past few months, we've seen a pronounced uptick in cyber attacks of all stripes. However, the most directly destructive are ransomware attacks. For the blessedly uninitiated, a ransomware attack is when a piece of malware finds its way onto your computer and sets about encrypting all of your files. Once it

2020-10-21T12:39:15-04:00October 21st, 2020|Uncategorized|

Virtual Workstations Improve Data Security

Virtual Workstations Improve Data Security Deep Core Data serves a number of organizations with strict data management policies – with files and data that can't be accessed or removed from the sites they live on.  So how do you do remote work at a site like that?  Virtual workstations. Legal firms, accounting firms, doctor's offices,

2020-10-07T16:15:54-04:00October 7th, 2020|Uncategorized|

Phishing and Spoofing Schemes on Office 365

Phishing and Spoofing Schemes on Office 365 In the past year or so, we've seen an uptick in a particular methodology of international cybercriminals preying on US and Canadian businesses. Knowing what their tactics are can help keep you and your customers safe.The start of the attack is usually when the criminals obtain the Office

2020-09-23T11:01:45-04:00September 23rd, 2020|Uncategorized|

Space Probe Mode

Space Probe Mode In November 2006, the Mars Global Surveyor had been orbiting the Red Planet for over nine years. On the second of November, the mission team at NASA ordered the spacecraft to reorient a solar panel, and suddenly the decade-old spacecraft lost contact with Earth forever. A small error introduced months earlier, when

2020-09-09T14:23:17-04:00September 9th, 2020|Uncategorized|