Category: Catalogic

Don’t Put All Your Eggs in One Basket – The 3-2-1 Backup Strategy Explained

Remember Luke Skywalker setting out to destroy the Death Star with only one set of its plans stored in a little droid’s head? Losing them would likely have doomed his mission to save the galaxy. Similarly, in our digital world, safeguarding data is crucial. The 3-2-1 backup strategy is a vital defense against data loss. This article gives a basic overview of the 3-2-1 backup rule as well as explains advanced tactics that may be used to make data even more secure.

This is what you will learn in the next few minutes:

  1. What is the 3-2-1 backup strategy?
  2. Why is the 3-2-1 rule essential for data protection? 
  3. How to implement the 3-2-1 backup method effectively? 
  4. The role of off-site backup in the 3-2-1 strategy 
  5. What is the 3-3-2-1-1 Rule, and how is it applied in its specific context?

What is a 3-2-1 Backup Strategy?

The 3-2-1 backup strategy is a foundational approach in data management and protection, widely advocated for its effectiveness in securing data against loss or corruption. The strategy’s name itself outlines its three core components: three copies of data, stored on two different forms of media, with one copy kept offsite.

The first component of the strategy involves creating three separate copies of your data. This means having the original set of data plus two backups. This triad of copies offers a robust safety net against data loss. For instance, if one backup fails or gets corrupted, there is still another backup available. The idea is to eliminate the single point of failure, which is a common risk in data storage and management.

The second and third components of the strategy focus on the method and location of storage. Storing data on two different types of media(e.g. Tape) or platforms reduces the risk of simultaneous loss due to a single type of failure. For example, you might have one copy on an internal hard drive and another on an external SSD or in cloud storage.

The last principle, keeping one backup offsite, is a guard against physical disasters like fire, flood, or theft that could destroy all local copies. Offsite storage can be as simple as a physical drive in a secure, remote location or as modern as cloud-based storage. This geographical diversification of data storage further solidifies the data protection strategy, making the 3-2-1 rule a gold standard in data backup and disaster recovery planning. You can request a demo of 3-2-1 Backup here.

A Sobering Picture Of Today’s Digital Landscape 

On top of that, the 3-2-1 backup strategy is crucial in defending against rising hacker attacks. According to the research, there were 470 publicly disclosed security incidents in November 2023, involving 519,111,354 compromised records. The 3-2-1 backup strategy can largely reduce the risk of total data loss from cyber threats like ransomware.

“2023 has unveiled a stark reality in the digital realm: a surge of hacking groups exploiting vulnerabilities to launch attacks across numerous industries. Cybercrime, in all of its many forms, is here to stay. Too many organizations are making too much money for them to ever die. As we all know, ransomware and vulnerability incidents exemplify the daily threats that organizations face, leading to significant operational and financial repercussions,” said Ken Barth, CEO of Catalogic Software. 

“These developments have made it clear that a comprehensive cybersecurity strategy is no longer optional but essential. As the market evolves, we are seeing more and more creativity as the attackers gain experience on how best to penetrate their targets,” he added. 

Piecing Together Your 3-2-1 Backup Strategy

The 3-2-1 backup strategy is widely regarded as a standard in the realm of information security and data preservation. While this method doesn’t completely eliminate the possibility of data compromise, it significantly reduces the risks associated with backup procedures.

Here’s how data recovery works under the 3-2-1 approach:

  1. If the primary (active) data is corrupted, damaged, or lost, the first step is to retrieve the data from an in-house backup stored on a different medium or secondary storage system.
  2. Should the second data copy be inaccessible or compromised, the focus shifts to the off-site backup, which is then restored to the internal servers.
  3. After successfully restoring data, it’s crucial to restart the 3-2-1 backup process immediately. This ensures continuous and effective protection of the data.

A Step Beyond the 3-2-1 Backup Strategy

The 3-2-1 backup strategy has proven effective over time as a data protection method. However, with the evolution of storage systems and services, certain aspects of this strategy may need adaptation to fulfill current data protection goals.

Managing the multiple data copies in a 3-2-1 backup framework can become complex, depending on the backup methods an organization employs within this strategy.

Moreover, many organizations find themselves customizing their backup policies further while still maintaining the core principles of the 3-2-1 strategy. This leads to a modified approach, often referred to as the 3-2-1-#-#-# rule.

Introducing Catalogic Software

Catalogic Software stands as a bastion in the realm of data protection and bare metal restoration. Functioning as a crucial layer in the cybersecurity ecosystem of their customers, Catalogic supplements existing endpoint solutions and feeds data into their SIEM systems. They recognize that data protection, including bare metal restoration capabilities, is a customer’s last line of defense against various causes of outages. 

With three decades of expertise in data protection, Catalogic is incessantly working to counteract escalating cyber threats. Our flagship product, DPX, delivers a secure data protection solution with instant recoverability to help ensure you can protect your backup data set from ransomware and recover data in an instant when you need it. With DPX, you have integrated ransomware protection.

  • Support for the 3-2-1-1 rule that provides a robust data protection solution with verified scheduled recoveries for automated recovery testing,
  • 3 copies of your data,
  • 2 copies stored on different storage media types,
  • 1 of the copies offsite or in the cloud on immutable media,
  • 1 copy verified as recoverable.

Catalogic’s Variation: the 3-3-2-1-1 Rule

The 3-3-2-1-1 data protection rule offers a comprehensive approach to safeguarding data. Firstly, it emphasizes maintaining at least three copies of your data. Unique to this strategy, three of these copies are pre-scanned by GuardMode, adding an extra layer of ransomware protection. GuardMode actively monitors for suspicious activity, promptly alerts users, and prevents ransomware from encrypting backups.

Additionally, it’s advisable to keep these copies on two different types of media, enhancing data security by diversifying storage formats. Storing at least one copy in an off-site location, preferably air-gapped, further secures the data against local disasters or network breaches.

Finally, the rule includes maintaining one verified copy, specifically for recovery purposes, ensuring data integrity and swift restoration in case of data loss. This approach effectively blends traditional backup strategies with advanced, proactive security measures.

Closing Thoughts

Data is invaluable, and the 3-2-1 backup strategy is a key defense against data loss from cyberattacks, natural disasters, or human error. As a fundamental step in establishing a solid data backup policy, Catalogic collaborates with organizations to tailor backup solutions, accommodating any number of backups, choice of media, and storage locations, whether on-premises or in the cloud.

May the backups be with you always!

Read More
12/06/2023 0 Comments

Backup Upgrade: The Frequently Overlooked Must-Do in Software

A regular backup upgrade is crucial for cybersecurity. Yet, many overlook the importance of updating backup software. It’s a critical step. Why is it so vital? Backup software acts as your final safeguard against data loss and corruption. If cyber threats compromise your systems, robust backup software is key. It enables swift recovery. This minimizes the damage. Make sure to prioritize your backup software upgrade. It’s an essential defense in your digital environment.

8 Reasons to Prioritize Your Backup Software Upgrade

Upgrading backup software is paramount for organizations striving to enhance their cyber resilience. Upgrading backup software is of utmost importance for organizations aiming to improve their cyber resilience. This is because backup software plays a critical role in the overall data protection and recovery strategy of an organization. By upgrading their backup software, organizations can benefit from several key advantages:

1. Advanced Security Features.

Newer versions of backup software often come with improved security features, such as enhanced encryption algorithms, stronger authentication mechanisms, and better access controls. These features help protect backup data from unauthorized access and ensure its integrity.

For DPX users, features like GuardMode, vStor, and revamped user interfaces can bolster an organization’s ability to protect and recover data in the face of evolving cyber threats.  

2. Better Compatibility.

As technology evolves, older backup software may become incompatible with newer operating systems, hardware, and applications. Upgrading to the latest version ensures compatibility with the latest IT infrastructure, allowing organizations to seamlessly protect and recover their data.

3. Increased Performance.

Upgraded backup software often includes performance improvements like faster backup and recovery speeds, optimized resource utilization, and better handling of large data sets. These enhancements reduce downtime and improve overall operational efficiency.

4. Enhanced Automation and Integration.

Modern backup software offers increased automation capabilities and integration with other IT systems, enabling organizations to streamline their backup processes. Automation reduces the chances of human error, ensures regular backups, and simplifies disaster recovery workflows.

5. Advanced Recovery Options.

Upgraded backup software may introduce new recovery options, such as instant VM recovery, granular item-level recovery, and cross-platform recovery. These options grant organizations more flexibility and efficiency when restoring data after a cyber incident.

6. Better Data Management:

Upgraded backup software often includes advanced data management features like deduplication, compression, and tiered storage. These features help optimize storage utilization and reduce costs, making backup operations more efficient and cost-effective.

7. Compliance and Regulation

Many industries have specific data protection regulations that organizations must adhere to. Up-to-date backup software often includes features that help organizations meet these regulatory requirements, such as data retention policies, audit logs, and reporting capabilities.

8. Pro-Bono Upgrade Services

The availability of pro-bono upgrade services from software providers can be a game-changer. This offering not only ensures that organizations stay current with the latest security enhancements but also demonstrates a commitment to cybersecurity from the software vendor’s side, forging a stronger partnership in the battle against data breaches and cyberattacks. 

In conclusion, upgrading backup software ensures the security, compatibility, performance, automation, recovery options, data management, and compliance necessary to effectively protect data and withstand cyber threats.  Several key factors drive the urgency of this endeavor.  

Checking Compatibility Before Backup Upgrades

Assessing the compatibility of the latest backup software version with an organization’s existing infrastructure is a critical step in the decision-making process for upgrades. To ensure a seamless transition, several considerations come into play.  

The assurance of two-version backward compatibility provides peace of mind by ensuring that the new software can work with data from the current and previous two versions, safeguarding data integrity during the upgrade process.  

The choice between agent-based and agentless backups must align with the specific requirements and constraints of the infrastructure.  

Additionally, the availability of a compatibility matrix published by the software provider simplifies the evaluation process, offering a clear roadmap for compatibility checks.  

Furthermore, the ability to upgrade the master server independently, taking advantage of the latest feature sets, while scheduling upgrades for agent nodes at a later time, allows for a phased approach that minimizes disruptions.  

Lastly, the inclusion of an inventory and version report directly within the user interface streamlines the assessment, providing a real-time snapshot of compatibility and ensuring informed decisions that bolster the organization’s cyber resilience. 

Simplified Backup Management in New DPX Update

Usability Enhancements in DPX’s Latest Release

The latest version of DPX has brought several significant improvements from a usability standpoint, greatly enhancing day-to-day backup administration tasks.

One of the most noticeable enhancements has been the transition to a more user-friendly WebUI and simplified management interface. The latest DPX has made it much more intuitive and accessible, allowing administrators to efficiently manage their backup infrastructure with ease. 

GuardMode: Advancing Event Monitoring in DPX

Event monitoring has also seen remarkable improvements, particularly with the introduction of features like GuardMode. This cyber-resilient approach ensures that critical data remains vigilant even in the face of potential threats. The ability to monitor events in real-time and proactively respond to potential security breaches has become an integral part of backup administration, bolstering cybersecurity efforts. 

Transparent Reporting: SLA and Chargeback in DPX

SLA-based reporting and chargeback mechanisms have made tracking storage usage and data growth more transparent and actionable. Administrators can now generate reports that provide valuable insights into storage consumption trends, enabling better resource allocation and cost management. This level of visibility into the backup environment empowers organizations to optimize their backup strategies. 

Improved Security with DPX’s Role-Based Access Control

Furthermore, the latest DPX version has introduced improved role-based access control, allowing for more granular control over who can access and modify backup configurations. This feature enhances security and ensures that only authorized personnel can make critical changes, reducing the risk of accidental data loss or configuration errors. 

vStor Management: User Interface Improvements in DPX

The management of vStor, a key component of the backup infrastructure, has also seen notable enhancements in terms of its user interface (UI). The improved UI simplifies the process of managing storage resources, making it more efficient and user-friendly.

For DPX users, you can watch this YouTube video to check out “How to Migrate Your DPX Windows Master Server Seamlessly”.

Takeaway: Why Upgrading Your Backup Software is Essential

Upgrading your backup software should be a non-negotiable part of your cybersecurity strategy. It’s not just about staying current; it’s about ensuring your organization’s survival in the face of cyber threats. Here’s why:

  • Minimize Disruption: VM software-based solutions offer an easy upgrade path, often with little to no downtime, so you can continue to protect your data seamlessly.
  • Leverage New Features: With DPX’s GuardMode, vStor, and improved interfaces, you’re better equipped to fend off and recover from cyber incidents.
  • Benefit from Free Services: Many providers, like those of DPX, offer pro-bono upgrades, highlighting their commitment to your cybersecurity and offering a partnership in defense against data breaches.
  • Ensure Compatibility: Always check that new backup software aligns with your existing systems to guarantee a smooth transition and maintain data integrity.
  • Enhanced Usability: The new DPX version’s user-friendly interface and management features simplify backup administration, allowing you to manage backups more effectively and securely.

Remember, neglecting your backup software upgrades is a risk you can’t afford. Stay ahead of the curve and ensure your last line of defense is as strong as it can be.

Need help with your backup upgrade?
Reach out: info@catalogicsoftware.com

Read More
11/07/2023 0 Comments

Ransomware Attack Prevention: Insights, Real-Life Cases, and Proven Defenses

Ransomware is like an evil character lurking in the shadows, preying on businesses and governments. Its impact can be profoundly devastating, wreaking havoc through significant financial losses and reputational damage. Even the mightiest organizations, seemingly well-fortified, are vulnerable to these menacing attacks. While ransomware attacks continue to rise in number, it’s essential to know that there are good defenses you can use to stay safe.

Understanding Ransomware

Ransomware is a type of malicious software (malware) that encrypts the victim’s data, rendering it inaccessible. The attackers then demand a ransom payment in exchange for the decryption key necessary to regain access.

The type of ransomware used in an attack can vary. Some common varieties include crypto-ransomware, which encrypts important files; locker ransomware, which completely locks the user out of their device; and scareware, a type of ransomware that deceives users into thinking they have received a fine from a government agency.

A ransomware infection often happens through phishing emails or malicious websites. Cybercriminals trick users into clicking on a link or opening an attachment that installs the ransomware on their device.

Real-life Examples of Ransomware Attacks

WannaCry
Losses: $4 billion

In May 2017, WannaCry ransomware spread like wildfire throughout the Internet, locking up the data of 250,000 Microsoft Windows users in 150 countries. The hacking organization Shadow Brokers actively used a tool called EternalBlue, reportedly developed by the United States National Security Agency, to exploit a flaw in Microsoft Windows computers.

NotPetya
Losses: $10 billion

Petya first appeared in March of 2016. It hijacked Windows machines by infecting the master boot record. In June of 2017, a variation of the Petya ransomware was launched called NotPetya. There were two ways in which it differed from Petya. It infected systems using the EternalBlue exploit, and it was updated such that the infection could not be undone.

Costa Rican Government
Losses: $30 million per day of attack

The pro-Russian Conti group has declared a ransomware attack on the Costa Rican government. Thirty different government agencies in Costa Rica were targeted, including the Ministry of Finance and the Ministries of Science, Innovation, Technology, and Telecommunication, as well as the state-run internet service provider RACSA.

The Escalation of Ransomware Attacks

Ransomware attacks are on the rise globally. Every day, 1.7 million ransomware attacks happen, which means that 19 attacks happen every second. Cybersecurity Ventures predicts that by 2024, cybercrime will have cost the global economy $9.5 trillion USD. Cybercrime would rank as the third largest economy in the world, behind the United States and China, if assessed as a nation.

There are three main reasons why ransomware threats are growing and changing. First, hackers are always coming up with new ways to attack because they want to make a lot of money. Large ransom payments, which are common in cryptocurrencies to protect privacy, are still a strong motivation. Second, the fact that attackers are getting smarter is a very important factor.

Cybercriminals are getting better at taking advantage of software flaws, using advanced encryption methods, and tricking people into giving them information. Lastly, the move to work from home during the COVID-19 pandemic has widened the attack area, giving hackers more targets and chances to do damage.

Certain industries are more prone to attacks, including healthcare, education, and financial services. These industries are targeted due to their sensitive data and the high impact of disruptions.

The Cost of Ransomware Attacks

The cost of a ransomware attack can be staggering. Many victims opt to pay the ransom to quickly restore their operations. According to a report by Coveware, the average ransom payment in Q3 2020 was $233,817. By 2031, ransomware is projected to cost its victims about $265 billion (USD) a year.

However, the financial impact extends beyond the ransom payment. Businesses also face costs related to data recovery, system reinforcement, and potential regulatory fines. Plus, there’s the intangible cost of reputational damage and loss of customer trust.

Ransomware Groups: Who Are They?

Various ransomware groups operate worldwide, each with its own unique tactics and targets. Groups like REvil and Maze have gained notoriety for their high-profile attacks. These groups often operate as “Ransomware-as-a-Service” (RaaS), where they lease their ransomware to other criminals.

How to Safeguard Against Ransomware Attacks

Preventing a ransomware attack requires a multi-faceted approach. Key measures for ransomware protection include:

  • Regular data backups: Regularly back up your data to an external device or cloud service. This allows you to restore your system without paying the ransom.
  • Cybersecurity awareness: Educate employees about phishing scams and safe online practices.
  • Software updates: Keep all software and systems up-to-date to patch vulnerabilities that ransomware might exploit.
  • Security tools: Use antivirus software, firewalls, and other security tools to detect and prevent malware infections.

Introducing GuardMode

GuardMode protects backups from ransomware and works with server and edge protection, letting you find viruses or other problems with your data very early. It does this by keeping an eye on file shares and system behavior, even over the network, instead of using a specific code fingerprint.

GuardMode keeps track of and regularly updates more than 4,000 known ransomware threat patterns. It also checks for damaged files. While ransomware detection tools were made for security teams, GuardMode was made with the backup administrator and your backup solution in mind.

It has an easy-to-use detection system and can help administrators get back important data that was lost.

Conclusion

With the growing prevalence of ransomware attacks, understanding and protecting against this threat is crucial. Staying informed about the latest developments in ransomware and implementing robust security measures can help safeguard your data and operations against this cyber menace. Remember, prevention is always better than cure, especially when it comes to cybersecurity.

Read More
11/02/2023 0 Comments

International Women’s Day 2023

The theme of 2023 International Women’s Day is #EmbraceEquity. Equity ensures we recognize that not all people start from the same place and we must acknowledge and adjust imbalances. Equity means providing every woman with different resources and opportunities required to reach an equal outcome. The intention of celebrating International Women’s Day is not to make us women powerful. We are already powerful. It is about influencing the rest of the world views our strength. It’s about creating awareness, educating, and giving strength to every woman who thinks she is being suppressed or deprived of her right. 

For me, awareness should first begin in every household. It is important to learn how to respect a women’s existence and opinions. As parents of two boys, it’s our joint responsibility to educate them about equity, which is being fair and just to all. We must break down barriers and pave the way for future generations of women. If the new generation is not educated, then this struggle to create a better place for all shall never end. 

When the home is educated, it’s now time for the organizations to be educated too and that is only possible by creating an equitable workplace for woman. Organizations should provide different supports to make it possible for women to have equal access to the opportunities. The workplace needs to ensure promotions, pay scale, business involvement is not gender biased instead is driven by skillset, knowledge, experience, innovation of an individual. 

Catalogic has an inclusive workplace culture where everyone has an equal opportunity to contribute to and influence every part of the product growth. It strikes a perfect work-life balance and is very accommodating. When the CloudCasa service was under development, I was given the opportunity to work on it. The technology was completely new, but I had ample time, guidance, and resources to learn and contribute efficiently. It is a great place to work where you have opportunities to develop your skillsets, and equal importance is given to an employee’s family time. We are happier, more productive, and loyal. Everyone benefits. 

I truly believe that your work should speak for yourself, and if you find things not equitable, take appropriate actions and don’t be hesitant. We have the ability in us to face the challenges at home or at work to achieve professional development. Being a woman, you are learning new technologies, contributing to the company’s success, working day in and out just like any other fellow male employee. Organizations must be adaptable and willing to work to ensure everyone’s success equally. Equity is the pathway to true equality. 

Together we can all help forge an equal world. Let’s all embrace equity today and always. 

Read More
03/08/2023 0 Comments

System Administrator Appreciation Day

“SysAdmins are the gurus behind the scenes that keep us moving ahead. Home or business, keeping our lives in synch starts and stops with these hardworking folks. Ransomware, phishing attacks, viruses—cloud migrations, software/hardware updates, infrastructure architecture, website accessibility…want me to go on!! SysAdmins are constantly on the move in an always learning profession to keep us protected and our businesses/home lives running smoothly.” – Ken Barth, CEO of Catalogic Software.

The team at Catalogic would like to thank our IT Manager, Dawuan Myers, for his continuous help on all ends of our business. Check out Dawuan’s Q&A and learn from his experiences:

What is the day-to-day security part of your job?

Security is a big part of what I do every day. I spend a lot of my day doing what is necessary to keep our systems safe. We want to ensure we stay ahead of the curve to prevent ransomware attacks.

What actions have­­ you taken for phishing prevention?

We have scheduled malware scanning on all our critical systems. We went from scanning once a day to scanning multiple times daily. We also train our users on what to do when they receive messages that look suspicious as most phishing attacks originate through email.

How did the work-from-home transition affect your job role?

The WFH (Work from home) transition was a bit tough in the beginning. In IT, you are so used to interacting with people face-to-face. Going from face-to-face interaction to interacting more on Microsoft Teams and email was a bit challenging. It took some time to adjust to this “new normal.”

What is the most challenging part of your job?

It is always a challenge to keep up with the security patches that are released daily. I often receive vulnerability alerts for the various applications that we use. We have systems in place that allow us to auto-patch most of our systems. However, there are a few systems that require manual updates.

Sysadmins are responsible for a wide range of duties, but what are the most essential?

With ransomware attacks at an all-time high, communicating with our users, making sure we are always aware and alert, as well as keeping our systems up to date is extremely important.

 

Make sure you show your appreciation to all System Administrators today!

Read More
07/29/2022 0 Comments

Catalogic Poland Team Aids by Hosting Ukrainian Families

Catalogic has had a team in Warsaw, Poland for nearly three years and how it came about was completely unplanned. I visited a Warsaw-based company, Storware, in February 2018, a trip that led to Catalogic investing in them. While there, I found the people of Poland to be so impressive. They have big hearts, are fun and hospitable and possess a great blend of work ethic, hunger and a relentless pursuit towards perfection. This led to us building a team there (first for UI) and having the pleasure of working with over 50 people in Poland since then.

I still remember the look on their faces when I first met the Polish team and declared “I don’t drink, I don’t eat meat, I don’t smoke and I don’t eat carbs (I was on keto).”  While I was worried they’d be offended, they instead went out of their way to find a nice Thai restaurant that we still visit every time I go. Every visit, they picked me up from airports irrespective of when I land, and made sure I never eat breakfast or dinner alone (despite almost no overlap in our cuisine preferences). They enthusiastically took me around the old and new towns, and even changed their team building events to do something I also enjoy (bowling).

I showed up once in Prague with severe back spasms from a long flight, barely able to stand up and in debilitating pain. Our friends in Poland sent someone that lived near the Czech border all the way to Prague to ensure I could get some pain killers from a pharmacy.  My next stop was Warsaw and while there, they arranged first-class medical care and physical therapy for a quick recovery. I relay these experiences as examples of why I am the least surprised to hear about the hospitality the Polish people have shown towards the people of Ukraine fleeing their country out of no choice. 

No one walks away a winner in a war. We all lose while finding ourselves in the middle of senseless pursuit of power. And things are personal to our Polish team in this conflict, given we have an employee whose father is currently in Ukraine, and the massive immigration of the dislocated people of Ukraine. I however take hope in seeing how the people of Poland (and other neighboring countries) have rolled their sleeves up and are restoring faith in humanity and that good will eventually prevail.

Some of our employees are hosting Ukrainian families in their apartments. They tell heartbreaking stories of how young children wake up in the middle of the night scared and crying and how their mothers put up a brave face in front of them, only to cry themselves after the children are asleep. They talk about how their lives were so normal until just a few days ago. Some of our team members are also volunteering at non-profit organizations and some even at the Ukrainian border.

One employee was inconsolable after receiving messages full of desperation from 30+ refugee families when she published her contact information, volunteering to host a family. She wished she could help them all but could only host one family. Another employee was apologizing for not joining an update call, but when probed, it turned out he was laying new floors and painting his ancestral home getting it ready to host refugee families. Only a few months ago, we had talked about how this house was partly ravaged in a recent fire and led to devastation and death in his close-knit family. We are so proud and moved to know all these brilliant people and work with them day in and day out.

As a global company, Catalogic is committed to supporting our Poland team in helping Ukrainian refugees in any way possible, and we are thankful for the personal time and efforts of our local employees. Our host employees are taking dislocated families on a shopping trip to get them basic needs and we will be doing this again a few more times. One employee noted that it was the first time they had seen them smile in a week. We also give time-off to people that are volunteering and we help cover their expenses. We’re also taking steps to create jobs in that market, given that is one of the more sustainable ways we can help. We sent our first offer letter last week to someone dislocated from this crisis, the same day we first interviewed her. She has since accepted our offer and look forward to her journey with us. We will continue to give preference to hiring there and certainly hope to put a few smiles on their faces, however fleeting that moment may be, in the larger scheme of things.

We are also publishing a series of vetted charities for our global teams to donate to and we are sharing the many heart-warming stories to inspire our global teams to raise funds and help everyone in need. We hope that you will join us as well.

Read More
03/17/2022 0 Comments

Show Your Appreciation to All SysAdmins Today and Everyday

Great work to all the System Administrators in the world! These hard working, dedicated men and women play a huge role in all our lives. From our desks to our home offices, they are the backbone of the technology that integrates into our daily routines. They jump in when needed and often necessary, will work 24-hour days and thru the weekend to troubleshoot outages, increase capacity, fight ransomware, or answer questions from us. One of their major responsibilities is to make sure they have a data protection insurance policy if data is lost, a final backstop to protect our business data, our system configurations, and our corporate histories.

We’d like to take the time now to show our appreciation to all System Administrators, from our team to yours!

For Catalogic Software, we would like to thank our IT Manager, Dawuan Myers, for continuous help on all ends of our business. Please check out Dawuan’s Q&A and learn from his experiences:

 

Dawuan Myers – Q&A

  1. What keeps you up at night?
    Not what many will say. Being part of a backup company where I know I have robust recovery processes and products allows me to sleep pretty well at night.

    These days, my nightmares often have to do with waking up to a $100k cloud bill from a runaway workload or a code change deployment. It has happened once before and hopefully never again!

  2. What do you see as the biggest emerging threat?
    People taking advantage of your weaknesses is a profession. Recent Ransomware and cybersecurity trends are maddening, and it’s hard to fathom that there is an industry built to make your life miserable. The thought of going through a major attack over a long weekend when I am looking forward to spending time with family is just sickening to me.
  3. What would be your advice to management to make a sysadmin’s job easier?
    Our management team has been great and incredibly supportive. They allow us to keep our systems up to date with patches which helps us fight any known cyber threats before reaching our network. If I had to give any advice; it would be to continue to be supportive and patch your systems.
  4. What would be your request to your users that would make your job easier?
    Be safe and continue to communicate.

    With all that is going on with malware and ransomware threats, I always advise our users to take a safe approach and communicate anything that looks suspicious. Being proactive is always better than being reactive.

  5. What would you want to do more of? Or learn more of?

    The Linux OS is something I would like to continue to learn more about. Coming into Catalogic Software 7 years ago with a Windows OS background, I needed to learn Linux OS and commands quickly. We do have a mixed environment, however a lot of what we do is based around Linux. I would like to take the next step up from being an Intermediate Linux administrator.

  6. We know you just got promoted to be an IT Manager. Congratulations! What are you most looking forward to, in your new role?
    Thanks! I look forward to continuing to improve our network and help support and manage the cloud infrastructure costs for CloudCasa, our new cloud native, Kubernetes backup-as-a-service.

Read More
07/30/2021 0 Comments