Author: rory-admin

  • California retiree’s pensions possibly in limbo after data breach targets the nation’s biggest pension funds

    California retiree’s pensions possibly in limbo after data breach targets the nation’s biggest pension funds

    News just broke yesterday that a data breach targeting the nation’s biggest pension funds CalPERS (California Public Employees’ Retirement System) and CalSTRS (California State Teachers’ Retirement System) lead to the release of identity information on more than 1.1 million of their members collectively.

    Not only will this breach possibly affect the pensions and identity security of existing members but also those who have not yet reached retirement age but whose information is still in the system. Even family members of affected users may have had their identifying information leaked during the breach if their details were added to these systems.

    CalPERS released a statement saying that the breach did not affect their own systems and it will not affect current members’ monthly benefits. Still, the company has said they have upped their security measures and will be offering free credit monitoring for affected users. Users should receive a notice soon as to whether or not their information was identified as being compromised by the breach.

    Information that was allegedly leaked includes addresses, dates of birth, social security numbers and more.

    The origin of the breach was through the PBI Research Services MOVEit file management software which CalPERS and CalSTRS use as a third-party vendor to identify death benefits or for additional beneficiaries in their systems. The effects of this the zero day hack on the MOVEit software are still reverberating throughout the US, with other companies reporting being affected such as Siemens, UCLA, Schneider Electric and more.

    Although PBI Research Services was notified of the breach themselves on June 4th, it was still two more weeks before CalPERS and CalSTRS were notified which has led to a delayed response. PBI has also notified federal law enforcement to ensure extra steps are taken to protect the pension fund status of affected users. Additional identity checks are expected to be put in place to make sure pension funds are only claimed by those who are eligible for them.

    California’s treasurer Fiona Ma is urging that a special meeting be held to discuss the aftermath of this breach, which only elaborates how serious this is. Ma sits on the board of both pension funds.

    We want to reiterate that pension funds are not currently at risk, however due to the nature of identity theft, preventing future fallout from this breach is of the utmost importance and no small task.

    This breach elaborates on the importance of vetting your vendors well. Even if you’re doing everything you can to protect your business from a cyber-attack, vendors you use that have access to your systems also need to do their part or your efforts may be in vain. Here is a checklist you can use when vetting a new technology vendor:

    If you need assistance in making in recovering for a data breach, or to prevent one from happening to your business in the first place Valley Techlogic is here for you. Cyber security efficacy is one of our core company values and our customers security concerns are regarded with the utmost importance. Schedule a consultation today to learn more.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • Keep running out of disk space? Here are our solutions.

    Keep running out of disk space? Here are our solutions.

    Have you been getting a low disk space error on your Windows device? This means your computer is out of space to download new files or even apply crucial updates. There are some obvious solutions to the problem and not some not obvious solutions that will help you solve the problem in the long term.

    The first obvious solution is to delete files you no longer need. If your SSD or hard drive is on the smaller side this can be easier said than done. It’s important to remember a Windows installation typically takes up 90 GBs of space, so if you’re only working with 250 GBs that’s nearly half your drive space utilized off the bat. We often recommend customers keep this in mind when they’re shopping for a new computer.

    The second obvious solution is to clear your computer of junk files, such as temporary files or cookies. You can do this quickly by searching for “Disk Cleanup” in the search bar on your task bar or by hitting Windows Key + R and typing “cleanmgr” in the box that comes up. Then you select the drive you wish to clean (typically C). The temporary files folder should already be selected but you can choose to clean up more folders if you would like (Recycle Bin is often another good choice for reclaim space).

    This is an example of what the Disc Cleanup tool can do.

    The third option, which may be a little trickier depending on the type of device you have, is to add additional storage. For a desktop computer with additional drive bays, it can be relatively easy to have an extra SSD installed though you may require assistance in pairing it with your computer. Laptops often have their storage soldered, meaning an upgrade is not possible, however this can vary and it’s best to leave this up to a professional.

    Some of the not so obvious solutions are:

    1. For Microsoft 365 users, you actually have access to 1 TB of personal storage through OneDrive. This means you can move some of your files to your OneDrive storage while clearing up space on your personal computer. Even free users have access to 5 GBs of personal space. We created an article on how to best utilize your OneDrive storage here.
    2. Transfer large files to an external drive. While less convenient then having the drive built into your device, external drives are quite affordable and can work in a pinch to give you the space you need while evaluating whether more permanent storage remedies are available.
    3. Verify your drive is actually full. Some viruses and malware can either fill up your device with bogus files or trigger this error, so it’s best to have an IT professional evaluate your device if you’re getting a “Low Disk Space” error when you know you should have adequate space available.

    If you do have low disk space, you may be wondering how often the error will pop up for you. It depends on just how much space you have left. Windows typically issues 3 warnings.

    1. At 200 MBs remaining the error will show up once for 10 seconds.
    2. At 80 MBs remaining the error will show up every 4 hours for 30 seconds.
    3. At 50 MBs remaining the error will show up at every 5 minutes for 30 seconds, obviously by this point it’s crucial the issue be addressed.

    If you’ve reached this point and decided it’s a good idea to replace or add storage to your device, you may be wondering what to buy. For laptops and desktops, we really recommend SSDs over hard drives. Hard drives contain a physical component (a disk that spins) and this part can break down with use and leave you in the lurch. Even with SSDs though there is high end and low end. We’ve broken down some of this information in the chart below.

    Need more advice on purchasing storage for your business? Valley Techlogic are procurement experts, our sales team can work with you to choose the right storage options for your business and our technical team can manage your installation. Learn more about Valley Techlogic’s procurement services here or schedule a consultation today.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • Need a new work laptop? Here are five features to focus on

    Need a new work laptop? Here are five features to focus on

    Selecting a new work device is a personal choice, there are factors a lot of buyers focus on. Sizing, screen type, track pad feel or material, keyboard type. All of these peripheral factors that go into choosing the perfect laptop to complete your work on.

    We want to dig specifically into what you should consider when it comes to the specs of your work laptop. What you do and how you do it will greatly affect whether a laptop is the right choice for you, from smaller footprint lower cost models that work perfectly for light duty to robust, graphic and memory intense models that can handle high use scenarios such as graphic design or multi-tasking.

    Here are the five things we consider most important when it comes to the use of your laptop for work.

    1. Battery Life. Battery life may not be as important if you intend to dock your computer at a desk and leave it there primarily. If you need your laptop on the go, however battery life is hugely important and what’s available varies widely. One thing to remember is that higher specs usually correlate to less battery life, so if your job is light duty but on the go it may be better to look for a lighter, less powerful laptop.
    2. RAM/Memory. No matter what we recommend at least 16 GBs in your laptop (or the ability to upgrade). This is because Windows itself uses quite a bit of memory, so if you opt for less memory in your work laptop you may find it struggles to keep up. 8 GBs might be okay for very, very light usage but for heavy users 16 or 32 GBs is preferable.
    3. Storage. Again, because Windows does use up some of the storage available for its installation we want to look for more capacity if possible. For light users 500 GBs is fine, but for most users we would recommend at least 1 TB.
    4. Video Card. When you think video cards you might think gaming, but a good video card is also used by your computer for certain processes, especially graphically intense one. If video editing or graphic design is part of your workflow, we suggest looking for a work laptop with a better video card even if it’s a laptop that’s marketing is aimed at gamers. As a bonus these laptops will usually have a better quality screen as well.
    5. CPU. We can’t overlook the CPU quality In the laptop buying process. More CPU power means more capacity to run programs or have a lot of tabs open in your browser.

    Of course, if you’re buying for many users within your organization, it can be difficult to customize your buying to specific users. At Valley Techlogic we’re able to make recommendations for laptops that will meet the needs of your workforce while also keeping budget in mind.

    Through Valley Techlogic’s procurement services we can help you buy new equipment for your office through our vendors with more choices than are usually offered through their brick-and-mortar presence. We have relationships with Dell, Lenovo, HP and more that we can use to your advantage.

    Valley Techlogic also offers installation services if you need help setting up your new equipment and getting it ready for your employees.

    Learn more about our procurement services today by clicking the banner below to get started, or click here to schedule a consultation.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • AWS vs Azure, what is your best option when choosing a cloud platform?

    AWS vs Azure, what is your best option when choosing a cloud platform?

    We’ve had articles in the past about why you should consider making the move from on-premises to the cloud, but we’ve never specifically addressed which provider you should consider when making this move.

    For many, AWS (Amazon Web Services) and Azure are the main players that they look to when making the jump the cloud. Brand recognition is obviously there for both choices, as well as a history of impeccable uptime. Uptime is a very important factor, obviously you want your data to be available when and how you need it, but there are more things to consider.

    First, let’s look at the players. AWS has been around since 2006 and offers a “pay as you go” model, which means you pay only for the data you actually use. Many of us are familiar with the webstore Amazon, and you’d probably be surprised to learn AWS is a much bigger venture for Amazon, with 74% of their profit coming from AWS.

    Azure was launched in 2010 and is also pay as you go. However, how they differ is that Azure actually lets users access their data through a virtual machine on a Virtual Hard Desk (VHD). This means their interface is slightly more user friendly from the start. For a similar interface in AWS you must rent an EC2 (their version of a virtual machine). EC2 is more customizable but Azures Virtual Machine may more easily work with existing Cloud computing tools.

    Both are similar in that they offer scalable storage solutions; however, their object size restrictions vary slightly, with AWS having a 5 TB object size limit and Azure having a 4.75 TB limit. For most of our customers this would be a very negligible difference, however.

    Both do an excellent job of securing your data, in AWS you customize your security settings on setup. With Azure, they use Microsoft’s Cloud Defender services which are similar to the Windows Defender services you probably already utilize.

    AWS has a dashboard that may be easier to use if it’s your first-time using cloud services when it comes to looking for documentation on how to use the service. Where Azure has them beat though is that Azure keeps all of your user account and information in one place. So, depending on which kind of information you’re looking for, you may prefer one over the other.

    If customizing your cloud experience via code is something you’re after, you probably want to stick with AWS. Through their SageMaker system you can utilize their artificial intelligence (AI) tools to develop a very specific and unique experience when it comes to tracking data, making modifications, and applying updates.

    Azure on the other hand has opted for a “Codeless” interface, even someone with zero coding knowledge can drag and drop pieces to customize their cloud’s AI interface.

    Of course, from a base level you can look at what operating system these are compatible with. AWS is more compatible with Linux while Azure offers compatibility through .net with Linux, Windows and MacOS.

    In a nutshell, these two cloud behemoths are more alike than different but there are some factors that depending on your particular business sector or goals may lead you to shift one way or the other. We also want to spend a moment addressing a pricing breakdown for both AWS and Azure. You can see their pricing models in the chart below. We also want to note that both provide a free introductory period so you can test their services before committing to a plan.

    Are you considering a move to the cloud and aren’t sure which provider to go with, or even how to make it happen? Valley Techlogic can help. We’re experts in cloud computing and have managed many customer cloud migrations. Reach out today to schedule a free consultation.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • Security Camera Buying Guide for Businesses in 2023

    Security Camera Buying Guide for Businesses in 2023

    We may be alone here, but it seems like the interest in security cameras has climbed over the past year. Perhaps it’s because the technology has vastly improved over the last decade and our clients are ready to swap out slower, inefficient models that capture lackluster video at and are expensive to maintain for newer models that capture crisp clear video and have increased features to make reviewing that video much, much easier.

    If you were unaware, the grainy surveillance footage you’re used to seeing is quickly becoming a thing of the past. If you’re a fan of crime dramas, you may have seen the police officers in those show ask to have a video unrealistically “enhanced” to show the suspects on screen from original footage that starts out barely visible. Now, that sort of technology is in some cases a reality.

    Instead of starting with grainy footage, the cameras we have available for our customers have clear easy to view footage of a wider area than you would have been able to get in the past (meaning less cameras to buy to cover the same square footage). These cameras are also backed by software enhancements that enable you to search through the footage to find a specific time, an object such as a license plate, or even specific people.

    You can learn more about the AVA powered camera systems we offer here. The best thing about the AVA solution is it can pair with your existing cameras, allowing you access to many of these benefits without buying new cameras.

    That brings us to the pros and cons of buying a new camera system for your business:

    • Pro: Enhanced Features, obviously we just spent some time going over the features you’ll stand to gain from a new camera system. Another feature you may not have considered is reduced storage costs; many camera systems now store data in the cloud meaning you will not have to pay for onsite storage (which can add up if you tend to save your footage for a while).
    • Con: Cost, obviously the cost of a new camera system can be quite expensive, but perhaps less than you may think. As technology has grown and cameras have become more ubiquitous, the costs have also dropped.
    • Pro: More Options to Fit More Spaces, if you have old school bullet style cameras only you may be surprised at the range of options and styles available now. We still recommend the bullet style for outdoor use as it’s very obvious that a camera is in place to potential intruders, but for in office use a more discreet camera might make more sense (and you can look at our chart on camera styles below).
    • Con: Installation, going through the installation of any kind of equipment can bring up unforeseen issues. Problems with wiring or getting the placement exactly right for the location it’s being placed. There is of course the expense of the installation too, which in some cases can rival the cost of the cameras themselves. Every situation is different and it’s best to have your specific setup reviewed by a technician to get a clear estimate.
    • Pro: Better Able to Work in a Variety of Conditions, older cameras often didn’t handle interference or poor lighting very well. Today’s cameras can adjust for poor lighting or poor visibility and some cameras even offer night vision for poorly lit areas of your building.
    • Con: Software Costs, of course for AI or software backed cameras you will encounter a software cost for utilizing those features. We feel it’s more than worth it considering how much more useful your cameras will be for your business and should be considered part of the cost of maintaining your security in your business.
    • Pro: More Integrations, as our AVA page illustrates, many of today’s camera systems also integrate with sensors that can monitor for odors or liquids, and even specific sounds (such as screaming or a gunshot).
    • Con: There really aren’t any additional cons outside of the expense and going through the installation process, once your new camera system is in place you will wonder how you ever got by without it.

    Here is a brief overview of the types of cameras that are now available on the market:

    While we recommend the AVA solution the most for our clients, we have camera system options for businesses of all shapes and sizes. We would be more than happy to provide a custom estimate for your business, reach out today to schedule a walkthrough with one of our security camera experts.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • Refurbished versus new, what are your options when it comes to on-premises servers?

    Refurbished versus new, what are your options when it comes to on-premises servers?

    There’s no debate, when it comes to buying an on-premises server for your office it’s a big decision where cost is absolutely a major factor. The word “refurbished” sometimes causes our clients to recoil, we’ve all had bad experiences purchasing refurbished electronics that were DOA (dead on arrival) or perhaps were cosmetically or functionally dubious.

    With servers it’s a little different. Typically, what we see from servers is that one was sent back to the retailer very early on into its life span. Sometimes it’s because the configuration just wasn’t right for the purchaser or because they come from a sector that has very rigorous standards for server replacement (some sectors look to replace servers every 3 years). These servers will still have a lot of life left in them and the big server manufacturers (Dell, IBM, HP etc) will reset them, add some new components, and bring them back up to practically like new conditions.

    If you have a very specific goal in mind for your on-premises server and know you need the latest and greatest hardware components to meet that goal, then we definitely recommend purchasing new. If your goal is to replace an existing aging server or your needs for capacity are more minimal, refurbished is a great option.

    Here are three pluses when buying a new server.

    1. Warranty – New servers will have the longest warranty available; we typically see 5 years being the standard.
    2. Customizable – When you buy a new server you get to customize the hardware and storage, with a refurbished server you’re purchasing what the manufacturer has available.
    3. Modern Features – A new server will have all the latest features, have the highest performance, and be compatible with modern software.

    There also pluses when considering refurbished:

    1. Cost Saving – Of course, the first plus is the cost saving benefits. We often find a refurbished server is substantially less than a new server. You could save as much as 80% compared to buying a new server.
    2. Still Effective – A refurbished server will still be almost as effective as a new server, and for many of our clients there is no noticeable difference between new and refurbished for their use case.
    3. Still Includes a Warranty – While it won’t come with a manufacturer’s warranty, Valley Techlogic offers a 1-year warranty for clients who purchase a refurbished server through us.

    Of course, there are things to consider when doing a server upgrade in general. Here is a chart with the benefits you will receive when replacing an aging on-premises server:

    Another thing to consider is if your current server is compatible with your existing line of office software a refurbished server may be more compatible, sometimes being on the bleeding edge of technology can have its downsides especially when it comes to legacy software.

    You also want to keep in mind that lead times will vary as well, refurbished servers are often more available while a server customized for your business could take longer to get. If your current server is on it’s last leg or has even died, refurbished may not be your best option but your only option.

    There are a lot of things to consider when it comes to buying a server, and Valley Techlogic can help. We not only offer in-house procurement services we also can do an assessment of your specific situation and offer the best buying advice for your business. Reach out today to learn more.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • RAID Arrays Explained, What is it and do you need one?

    RAID Arrays Explained, What is it and do you need one?

    RAID arrays or Redundant Array of Independent Disks is a type of storage configuration where your data is saved across multiple hard drives or SSDs. There are a number of benefits to doing this including increased performance and data redundancy. Because your data is saved across multiple drives you have better protection in the event of a drive failure.

    Basically, if one of the drives in your RAID array fails your drives will then go into “rebuild mode” which will allow the remaining drives to recover the data, the failed drive can then be replaced with little downtime for you. A RAID array is not always necessary, we wouldn’t suggest one for regular employee use for example as SSDs are very reliable (especially compared to hard drives with mechanical parts that can fail). You also have the option of cloud storage for devices that don’t have much data to save on a daily basis.

    However, for servers or other systems where data protection is critical, a RAID array is a necessary option to keep that data intact. They are also beneficial for systems that work with very large files as the computer can pull pieces of the file in unison and load them much quicker than a single drive. There are many different configurations for RAID arrays such as:

    1. RAID 0: In the world of data two is one and one is zero, and such is the case with RAID arrays. The first RAID array configuration involves breaking up your data into “stripes” across one or more drives, however it does not provide redundancy like other RAID arrays do. If a drive fails under RAID 0 the data is lost. However, it does improve speeds and can allow you to gain more space on your drives.
    2. RAID 1 provides an exact mirror of your data across multiple drives, which does allow for data redundancy. In the case of a drive failure as long as one drive is functional you will still have access to your data. The pitfall to this is your data storage can only be as big as the largest drive in the array, so if you have a 1 TB drive paired with a 4 TB drive only 1 TB would be usable. This RAID array type also doesn’t really provide a system performance boost, it’s purely a data redundancy setup.
    3. RAID 5 provides good redundancy coverage and improves performance. A RAID 5 array consists of 3 or more drives, this RAID array type splits your data consistently across the board and improves your system performance at the same time. However, for most clients we would suggest the next setup.
    4. RAID 10 combines two RAID 1 arrays with two RAID 0 arrays to provide both greatly improving performance (that falls in line with the RAID 0 benefit) and greatly increasing redundancy (as you get with a traditional RAID 1 set up) for not much more than you would spend to have a RAID 5 installed. For systems that run software in addition to storing data this is the setup we highly recommend.

    Here are some other benefits of having a RAID 10 setup for your server or systems where data is a high priority:

    RAID 10 Benefits ExplainedThere are still other questions that need to be answered beyond just RAID type, like what drive capacity should you be looking for? Would a HDD (Hard Drive Disk) work in this case to have more inexpensive but higher capacity or should you be looking for SDDs (Solid State Drives)?

    These are questions that can be answered by our professional sales team, they’re experts in technical equipment procurement and can help make suggestions and offer buying advice specifically tailored to your business. Learn more today by scheduling a consultation with our sales manager.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • Patch Management 101 – From Neglected to Automated; 5 Tips for Managing Patching in your Business

    Patch Management 101 – From Neglected to Automated; 5 Tips for Managing Patching in your Business

    If we asked a new client what they had in place for patching most of them would answer in one of two ways. Either they’re “pretty sure” patching is happening regularly, or they know patches have mostly been ignored for quite some time.

    Regardless of how they answered, the outcome is usually the same. We usually inherit managing systems that are way behind on patches. That’s because patching doesn’t start out being an automated easy process for most businesses, there is some effort required to get into a good patching process established.

    If patching is left up to employees for their devices, it’s typical for the “Remind Me Later” to become the permanent option when it comes to patching. Depending on their level within your company this can either be a bad idea to very risky (though any device can act as a threat vector when it’s connected to your network). If a device that has admin level access is unpatched and it’s basically handing the keys to your kingdom over to bad actors.

    That’s because many patches are released specifically to address an active security concern. While functionality and quality of life improvements are also addressed via patching, active security concern patches can be released with little notice and should not be ignored.

    We’re also aware many users have a negative association with patching, especially if they’ve installed patches in the past and encountered bugs or issues. While these patches can be rolled back, it may not be simple to do so especially if your machine hasn’t been set up that way.

    There’s also patches for IoT (Internet of Things) and peripheral devices that aren’t as simple as clicking “Update Now”. Many times, patching these devices involves going to the companies website, downloading the patch, and manually installing it. With routers in particular patches are typically released to address a very serious security threat. We reported on a series of Netgear routers which when unpatched could easily be taken over by an intruder.

    Now that we’ve established why patching is important, here are five ways to make it more manageable:

    1. Create an Inventory of Devices Within Your Business: To manage consistent patching across the board you first need to know what you have. It’s a good idea to keep an inventory of all your devices (even peripherals or handheld devices like tablets).
    2. Create Consistency for Work Devices: For devices you or your employees work on, like laptops and desktops, it’s a good idea to try and maintain consistency. Meaning if you’re applying a patch to one of them you should apply it to all of them. That way it’s not a mishmash of various updates across your business. This will also make it much easier to troubleshoot any issues.
    3. Make Sure They’re Running the Latest OS (Operating System) Too: For Windows devices, it’s also important to keep them up to date with the latest OS version. Windows will discontinue patches for operating systems that have reached end-of-life. This doesn’t mean they no longer require patching; in fact, these devices are often targeted by hackers specifically because they can no longer be maintained.
    4. Also, for Windows Devices Have a Group Policy for Patching: This is an advanced tip, but you or your current IT provider can setup a group policy to make sure patches are occurring on a schedule for Windows devices.
    5. Work With a Professional to Create a Patching Plan: Patching is part of ongoing maintenance, and it can be difficult to address it on your own. At Valley Techlogic patching management is provided under every monthly service plan with us.

    Here is a mini report on how Valley Techlogic addresses patching management (as well as other routine maintenance items):

    Interested in learning more? Schedule a consultation with us today.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.

  • Western Digital suffers a ransomware attack, with hackers requesting an 8 figure sum and leaking image from internal meeting

    Western Digital suffers a ransomware attack, with hackers requesting an 8 figure sum and leaking image from internal meeting

    Western Digital is a well-known name in the data production and storage industry. Established in 1970, they were one of the original players in the process of making semiconductors and they have a storied history that began with calculator chips, included a bankruptcy as well as being at the forefront of floppy disc creation in the 1980’s to eventually the hard drives they became known for in the 1990’s. Chances are good you have had a Western Digital drive in one of your devices (you may even have one now).

    Despite being leaders in the digital storage industry, they’ve unfortunately proven no one is immune when it comes to ransomware attacks. While this story emerged mid-April (and the attack occurred March 26) we have an update as the hacker group “BlackCat” taunts Western Digital by leaking an internal video conference on the topic just this week. They leaked an image from the meeting on social media coyly dubbing the people included “the finest threat hunters Western Digital has to offer”. A clear mockery of their attempts to remediate the threat thus far.

    The hacker group is clearly trying to up the ante to get the company to fork over the ransom they’ve requested, a sum reportedly coming in at an eye watering 8 figures. For context a typical ransomware payment paid out by a business in Quarter 1 of 2022 was $228, 125. For individuals payouts hover around $6000. In a nutshell, ransomware is a lucrative business for those with unscrupulous motives.

    To make matters worse, it’s been reported that the group BlackCat has access to multiple Western Digital systems. Meaning this attack was well orchestrated and highly effective at not only making their data vulnerable but creating a disruption to all parts of their business. Western Digital has reported requested the services of outside security and forensic experts to try and recover what they can but needless to say this is an expensive lesson for their business both in money and time lost as well as their reputation in the technical industry.

    You would think being a leader in data storage that their backup recovery process would be flawless, unfortunately when hackers gain domain level access even the best laid plans for your data can go out the window. That’s why Valley Techlogic offers a multi-pronged approach to backups.

    Many clients like the idea that all their data is at their fingertips within their on-premises server. The server itself serves as a physical reminder that their data is ready and available when they need it.

    Unfortunately, having your data all in one place is not a good idea. Other than ransomware attacks such as this, it also leaves your business vulnerable if your server fails for whatever reason. We’ve seen it before; many clients aren’t expecting their servers to just give out or for something like a fire or other disaster to affect them and when it happens, they’re left scrambling. The process to recover from scratch is not always guaranteed and even if a recovery is possible, it can take as long as 3 months to get back mostly to where you were. Generally, a 100% recovery is not possible in these instances.

    That’s why at Valley Techlogic our backup solution TechVault is available and used by each of our clients. We have this chart on the benefits of our TechVault solution.

    You can also learn more about it by visiting here. If the Western Digital breach has left you concerned for the safety of your data, or you would just like more information on our backup solution you can request a consultation with our expert sales staff here.

    Looking for more to read? We suggest these other articles from our site.

    This article was powered by Valley Techlogic, an IT service provider in Atwater, CA. You can find more information at https://www.valleytechlogic.com/ or on Facebook at https://www.facebook.com/valleytechlogic/ . Follow us on Twitter at https://x.com/valleytechlogic.