ATTACKING HYPER-AVAILABILITY

Meet the Villains

Some lines of text in here

Take a look at each of the Villains special powers to see how they can destroy your business .

Vlad the Emailer

Sucks the life from your server via Phishing and email scams sent directly to you and your unsuspecting employees.

We’ve all received them. Those emails that are dressed up looking legitimate, full of links prompting you to ‘Act Now’ or provide personal information. Unbeknownst to you, Vlad is sat in wait for that deadly link click which will send his damaging wares careering through your systems – stealing and corrupting your undefended data as it goes.

Mal the Werewolf

 A tame and timid creature sitting inconspicuously on your screen, right up until you click that shady link and it turns into a snarling beast – wreaking havoc across your systems and leaving you a prisoner to its demands.

Releasing its venom in the form of viruses, trojans, ransomware or adware (to name just a few), one bite from Mal is enough to paralyse or even kill any IT system, irrespective of size. Thankfully, the Backup Heroes are on hand with the silver bullets – either ready to attack Mal should he pounce, or merely to keep this beastly creature of the night at bay.

n-Crypto Knight

A gallant hero, he isn’t – infiltrating even the toughest of defences with his tough outer shell and taking control of his new host. Once this guy is sitting at your round table, who knows what damage he could cause!

An expert in all-things encryption, the n-Crypto Knight is not only able to break apart your seemingly-protected data, but he can also throw a shield of his own across data that he’s taken control of – rendering it useless. Be sure to get your own armour on when this guy is knocking – without it, you might as well serve up your data at the next banquet!

Data Mouse

The cutest, yet most dangerous of the 4 Data Villains, this pesky rodent does nothing but squeeze through the cracks in any infrastructure – gnawing away at all of your important files and infesting your systems.


But all of this bluster from such a tiny creature need not scare you and your employees into submission. With unparalleled powers in system protection and data recovery, the Backup Heroes are on hand to either trap the puny terror before it infests your infrastructure, or neatly and wholly clear up it’s droppings after an attack…it’s a tough job, but someone’s got to do it!

The Heroes Mission:
Backup Heroes’ mission is to make people feel safe in the knowledge that our expertise, honesty, professionalism, planning and infrastructure will allow them to survive and prosper should the worst happen to their data and applications.