Techtalk Tuesday Blog home
Rob Williams http://cdn2.hubspot.net/hubfs/190934/Blog/Rob-Williams-circle.jpg Rob Williams is Oxford Networks’ Product Development Manager. He has over 15 years of experience in cloud services and telecommunications, developing solutions to meet the needs of SMB and Enterprise accounts. Rob believes that technology is an engine for companies to become more productive, and he seeks to create solutions that can help companies transform their business through adoption of cloud and unified communication solutions. rob-williams

Delta Airlines Outage Illustrates the Need for Business Continuity

Posted by Rob Williams on Tue, Aug 23, 2016 @ 09:30 AM

More details are emerging about the cause of the major outage at Delta Airlines, which caused 2,300 cancellations and 7,000 delays in the span of 3 days. 

The outage will most likely cost Delta tens of millions of dollars. After all, in a similar event, Southwest Airlines experienced a malfunctioning router that ended up costing them $54 million after more than 2,000 of their flights were delayed.

Adding to the overall cost of the incident, the airline waved change fees, which typically run in the hundreds of dollars. The airline also tried to appease passengers with refunds and $200 travel vouchers. This didn’t stop angry customers from posting complaints and pictures of long lines on social media, delivering a blow to the airline’s reputation.

Read More

Topics: Disaster Recovery

Don’t Be a Ransomware Victim: Protecting Your Organization Against the Cryptolocker Virus

Posted by Rob Williams on Tue, Aug 16, 2016 @ 09:30 AM

You open your office computer and see a huge shield on a red background. At the top of the screen you read “Your personal files are encrypted!” A clock counts down the time until a ransom is due. Your blood runs cold. You’re the latest victim of the Cryptolocker virus.

What Is Cryptolocker?

The Cryptolocker virus is a specific type of ransomware. While this Trojan may initially look like legitimate software, it uses an exploit kit to take advantage of vulnerabilities in outdated software, particularly Microsoft Windows.

Cryptolocker can enter your system through several pathways, including emails with infected attachments, malicious websites, and fake downloads. For example, some infected emails claim to be from a prominent shipping company that tried to deliver a package. The email contains a zip attachment that is infected.

Once the ransomware infects your system, it encrypts your files and demands payment—usually in the form of bitcoin—in return for an encryption key. Until you comply, your system is locked down.

Read More

Topics: Ransomware

Does Your Disaster Recovery Match Your IT Environment?

Posted by Rob Williams on Tue, Aug 09, 2016 @ 09:30 AM


Experiencing an IT disaster is not a matter of if, but when. According to IDC, over 70% of companies have suffered up to 10 hours of accidental downtime in the past 12 months. Approximately 27% of these organizations estimated the cost of downtime to range between $10,000 and $99,000 per hour.

Your business loses money every minute your employees are denied access to vital data and mission-critical applications. For this reason, you need a disaster recovery solution that guarantees rapid recovery times.

Unfortunately, many companies are relying on disaster recovery strategies that are more appropriate for physical environments, not today’s virtualized and cloud infrastructures. These legacy disaster recovery solutions use physical replication at a secondary site, instead of taking advantage of the flexibility of virtualization.

Learn about what makes for a good disaster recovery plan
in our eBook, 5 Things You Need to Know to Plan Your IT Disaster Recovery.

Read More

Topics: Disaster Recovery, business continuity

How to Simplify Data Center Migration

Posted by Rob Williams on Tue, Aug 02, 2016 @ 09:30 AM

Is it time for you to move your data center? You may be seeing the writing on the wall. Attempts to meet increasing storage needs may have led to server sprawl that eats up energy for cooling and takes up expensive real estate.

Your legacy infrastructure may be unable to meet the performance demands of big data analytics. According to IDC, the volume of valuable data will double by 2020 and 60% of the data will be actionable. If your system experiences long lag times or cannot work with such vast amounts of information, you may be unable to compete when you lose out on real-time insights.

Moving your data center gives you access to state-of-the-art infrastructure resources as well as management and monitoring services. But the migration process can be overwhelming for some companies.

Read More

Topics: Disaster Recovery

5 Reasons You Need a Robust Disaster Recovery Strategy

Posted by Rob Williams on Tue, Jul 26, 2016 @ 09:30 AM

The term disaster recovery inspires images of devastating natural disasters like hurricanes, tornadoes, or earthquakes. While fears about a major disaster are legitimate, they shouldn’t overshadow more common causes for outages and data loss. System failure and data loss happen every day.

Incidents of data loss are increasing every year, not from natural disasters but from attacks by hackers. According to the Identity Theft Resource Center, a total of 269 data breaches occurred by April 2016, compromising more than 11.27 million records.

These deliberate attacks make up only a fraction of data loss incidents. Verizon’s 2105 Data Breach Investigations Report found that 29.4% of data security incidents occur through “miscellaneous errors," making them the top cause.

With the odds stacked against your company, you can’t afford to put off developing a comprehensive disaster recovery plan.

Read More

Topics: Disaster Recovery

Ransomware: It’s Here and It’s Coming for Your SMB

Posted by Rob Williams on Tue, Jul 19, 2016 @ 09:30 AM

For companies that think they are too small to be the victim of a cyber crime, think again. There is a new cyber attack that searches and preys upon SMBs and personal users. Ransomware, otherwise known as a cryptolocker attack, is a sneaky phishing attack that tricks users into downloading malicious code.

This malicious code comes in many disguises and in many shapes and sizes. It can look like an email from a friend or a familiar company, or it could take the appearance of a free download of trial software. What all ransomware attacks have in common, though, is that the malicious code worms a sophisticated encryption into every file within its range.

Sometimes, the victim can be a personal computer. Other times, when a user is connected to a network, that infected encryption code can spread to an entire data center, locking down access to every stored file. This type of attack can be devastating for small and medium business owners. 

Know what makes up a secure and complete DR plan? Check out our eBook,
5 Things You Need to Know to Plan Your IT Disaster Recovery.

Read More

Topics: Security

Technology Trends Series: 5 Technologies Empowering the Legal Profession

Posted by Rob Williams on Tue, Jul 12, 2016 @ 09:30 AM

This blog series explores the innovative, unique ways that technology is being used to transform industries of all types. Find all of these articles in our eBook available here.

Rick Georges, author of the Future Lawyer blog, says that lawyers tend to be “behind the curve” with technology because they usually work based on previously established rules. This cautionary attitude is starting to change as lawyers realize how technology improves their communication with clients and streamlines the processes of research and due diligence.

Read More

Topics: Cloud

Technology Trends Series: 3 Innovative Ways Technology Is Empowering Education

Posted by Rob Williams on Tue, Jul 05, 2016 @ 09:30 AM

Think businesses and end users are the only ones reaping the rewards from new technology innovations? Think again.

This blog series explores the innovative, unique ways that technology is being used to transform industries of all types. All of the posts in this series will be rolled up into an eBook available here.

Today, we lay out the top 3 ways that technology advancements are transforming the world of education institutions:

Read More

Topics: Cloud, Technology Trends

Technology Trends Series: 5 Innovative Ways Technology Is Being Used in Manufacturing

Posted by Rob Williams on Tue, Jun 28, 2016 @ 09:30 AM

Companies in every industry are undergoing major changes, and manufacturing is no different. Manufacturers are looking to drive out inefficiencies, reduce costs, improve customer experience, and increase competitiveness. They are adopting additive and nearshore manufacturing practices.

There are several key technologies that are converging to revolutionize how products make it to market. They not only allow existing manufacturing organizations to supercharge their businesses, but they can also open the door to potentially unknown competitors. 

Read More

Topics: Big Data, Cloud

Technology Trends Series: 4 Innovative Ways Technology is Empowering Law Enforcement

Posted by Rob Williams on Tue, Jun 21, 2016 @ 09:30 AM

Think businesses and end users are the only ones reaping the rewards from new technology innovations? Think again.

This blog series explores the innovative, unique ways that technology is being used to transform industries of all types. All of the posts in this series will be rolled up into an eBook available here.

Today, we uncover the top 4 ways tech advancements are being used to empower law enforcement agencies. 

Read More

Topics: Cloud

Leave a comment for us

Join the Tech Talk Discussion.
Subscribe via Email.

Oxford Networks Guest Blogger:





Follow Oxford Networks