Keep up with the latest insights in colocation, cloud, and disaster recovery services
Check out this quick, 9-item primer on AWS Bottlerocket, a new open source Linux-based Operating System (OS) that’s purpose-built to run containers.
It’s important to have a disaster recovery plan, but it’s equally as important to make sure that it works. Here’s how.
SCTG is taking steps to mitigate a vulnerability (CVE-2020-5366) in the iDRAC9 controller onboard Dell EMC PowerEdge 14th-Generation servers.
Security researchers have discovered a 17-year old bug in Windows Server that allows a hacker to gain Domain Admin rights to your system. Here’s what to do.
No one wants to deal with building their own data center anymore. But cloud isn’t the only alternative.
In light of rapidly changing business conditions, ServerCentral Turing Group (SCTG), today announced its Essential Chicago initiative to provide managed IT services to Chicago essential businesses for the remainder of 2020. The company’s Essential...
VMware announced a vCenter security vulnerability rated 10 out of 10 on the CVSS v3 scale due to the likelihood and ease of an attacker exploiting it.
COVID-19 research is performed in labs — but not the kind you might think. Thanks to the biomedical research platform Folding@home (F@h), computer labs operating out of regular people’s homes are actually running the complex calculations that will help scientists understand the coronavirus. Here’s how to get involved.
To secure your backups, start by combining a local NAS or USB backup with a remote cloud backup (e.g., AWS or Google) for remote employees using storage.
Most businesses have a DR plan. But 23% of them admit to never testing their plans. That’s a problem — but not an unsolvable one.
Here’s a quick overview of the buzz (and substance) behind three of the most talked-about cloud technologies.
SCTG is currently taking steps to mitigate the CVE-2020-0796 security vulnerability on all internal systems and platforms. We advise all customers to take the necessary precautions to mitigate this exploit on their systems also.