It is often said that a Disaster Recovery Plan is only as good as it works in practice. This concept was put to the test for a client recently after their Hyper-V host was hit with a full disk encryption attack caused by a ransomware virus that renders the entire system useless. Of course, the first thing anyone in this situation asks is, “How could this happen?” But the real question is, “Can we recover?” The answer is not always, YES.
RRK Associates is proud to announce it made a huge step into another area of IT management with the successful competition of our first Point to Point WiFi installation. This project marks RRK Associates ability to provide our customers with dedicated WiFi connections over distances as much as 15 kilometers. These connections can be used to connect buildings, provide internet access to remote locations, and generally help expand your network to areas otherwise not covered with traditional wired connections.
Learn about the latest industry trends, what we're doing to stay ahead of the curve, and the strategies that make us special.
This is a silent installation file that will install our Inventory Agent. The Agent assesses the PC or Server and reports the information to us for review.
This is a silent installation file that will install our Security Assessment Agent. The Agent assesses the PC or Server and reports the information to us for review.
We love connecting with clients on social media. Follow us, tweet at us, tag us — we want to hear from you!