Garden State Backup Blog

News & Articles

Communicating with clients during cyber attacks

Published on

On the morning of October 21st, the world awoke to a deviously clever Distributed Denial of Service attack. It was to date the largest ever witnessed, with the attack load exceeding 1.2 terabits per second. Distributed Denial of Service (“DDoS”) ...

Database Backup Retention

Published on

We’ve seen much written on database backups:  how often, should you include transaction logs, how often to perform full backups, and what about testing. We see almost nothing about database backup retention. Without understanding this topic, you could find you ...

DevOps Companies

Published on

Less is more, more is less less is probably the single most commonly used tool in the SysAdmin toolbag.  less is a pager. It’s able to display the contents of a text file and enables scrolling through the file a ...

The Secret to Tracking Down Hackers

Published on

The Tool ISP’s use to track down hackers. If your network is under attack, how can you know who’s attacking you? Even if you know what part of the Internet the attack is coming from, what can you do about ...

Image Backups vs File Backups

Published on

Which is Best — Image Backups or File & Folder Backups? A perennial quandary for System Administrators everywhere concerns doing Image Backups or File & Folder Backups and which is better. Like all quandaries, there are opinions on both sides. ...

Red Hat Linux Bare Metal Backup

Published on

Red Hat Linux Bare Metal Backup with Relax and Recover (ReaR) Bare Metal Backup on Linux has always been a challenge. Initially, an administrator may attempt some combination of dump or tar to create a reproduction of a running machine. ...

Simple Hacks to Accept Credit Cards

Published on

The rules are called the Payment Card Industry Data Security Standards or PCI-DSS and are grouped into 12 areas of how a business handles credit cards. These are further broken down into some 220 requirements a business is required to ...

PCI DSS Compensating Controls

Published on

PCI DSS Compensating Controls — Rescued from a compliance nightmare If your business wants to accept credit cards, you must demonstrate compliance with the PCI DSS standard. It’s been said Dante reserved a special place in Hell for those who ...

Network Audits

Published on

Hunting for buried treasure In 1955, Teddy Tucker was treasure hunting off the coast of Bermuda. He’d brought up some interesting artifacts, but his instincts told him there was something big hiding below. It was hurricane season, and the weather ...

12 Next