Veeam Backup & Replication: Versatile Protection for Modern IT Environments

Part 2 of the 4-Part 2025 BDR Series [Part 1]    [Part 2]    [Part 3]    [Part 4] Alisanne Steele | Rabbit Hole Technology | blog | @RabbitHoleIT In today’s increasingly hybrid IT environments, organizations need more than just a basic backup tool — they need flexibility, scalability, and the confidence to restore fast in any situation. In Part 1 of […]

Six Ways We Shield Your Business from Ransomware in 2025

Alisanne Steele | Rabbit Hole Technology | blog |@RabbitHoleIT The Threat Landscape Has Evolved—So Have We Your business is more connected than ever. You rely on cloud platforms, mobile devices, remote collaboration tools, and digital workflows to drive productivity. But with that connectivity comes a growing cyber threat: ransomware. Cybercriminals are increasingly targeting small to mid-sized businesses—especially those without […]

Breaking Down PhishingBreaking Down Phishing in 2025: Why It’s Still Cybersecurity’s Top ThreatBreaking Down Phishing

Alisanne Steele | Rabbit Hole Technology | Friday, June 29, 2018 | blog 🧠 What Is Phishing? Phishing is a form of cybercrime where attackers impersonate trusted sources—like banks, healthcare providers, or even your CEO—to trick users into revealing sensitive information. These attacks often mimic real emails, login pages, or forms, and they’ve grown increasingly convincing with the help of […]

7 Characteristics of a Successful Backup Strategy

Alisanne Steele | TheSoftwareConsultant | May, 2025 Back in the late ‘90s, I met a fellow technologist at a conference who handed me a printed copy of “The Tao of Backup”, which posited that “to be enlightened, one must master the seven heads of Backup.” Those heads—Coverage, Frequency, Separation, History, Testing, Security, and Integrity—formed a guiding philosophy that’s still […]

To Cloud or Not To Cloud – Is that really the Question?

Alisanne Steele | Rabbit Hole Technology | Tuesday August 22, 2018 | blog Everyone is talking about cloud computing these days and for good reason. The cloud is revolutionizing how computing power is generated and consumed. Cloud refers to software and services that run on the Internet, instead of locally on your computer or internal network. When tech companies say […]

Simple Two-Factor Security That Can Protect Your Data From Compromise

Alisanne Steele | Rabbit Hole Technology | Thursday, July 26, 2018 |  blog Target, Twitter, Time-hop (the list goes on and on) have had data breaches exposing multi-millions of user’s personal and financial information to bad actors.  However, this personal data is just one part of the puzzle if your accounts are protected by additional layers of security.  Two-Factor […]

How to Spot a Phishing Attack

Alisanne Steele | Rabbit Hole Technology | Friday, June 15, 2018 | blog Would you know if you were the subject of a phishing attack? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing sites every month, a 65% […]

How to protect yourself from Phishing!

Alisanne Steele | Rabbit Hole Technology | Saturday, April 7, 2018 | blog Phishing: Phishing is the act of sending out malicious emails and has caused over $1.2 billion in loss. These malicious emails can be highly targeted and involve an extensive amount of planning. A successful phishing campaign can create a depressing ripple effect. Phishing often targets small professional […]