Tag: Database

wrangling sql server log files

Log-Wrangling 101: 7 Tips for Managing Your SQL Server Transaction Logs

In my last post, I broke down the parts of the anatomy of the SQL Server transaction log. In this post, I will share a few tips for keeping your transaction logs well-maintained and your SQL Server databases happy and healthy. Here are 7 important tips for managing your transaction logs: Now, let’s break these…
Read more

mixing sql backup strategies

The Risks of Mixing SQL Server Native Backups with Snapshot Technologies

As a DBA, one of the most critical aspects of managing SQL Server is ensuring the integrity and reliability of database backups. SQL Server’s native backup functionalities offer robust tools for securing your data, particularly for databases utilizing the full recovery model. However, mixing SQL Server native backups with disk or VM snapshots can lead…
Read more

sql server webinar

Should I Use VM Snapshots to Backup SQL Server? A Webinar

“Should I Use VM Snapshots to Backup SQL Server?” Like so many SQL Server related questions, the answer is “It depends.” However, most often the ultimate answer will be no. And, in this upcoming webinar we’ll share 8 questions you should ask before using VM snapshots as your approach to backing up SQL Server. RTO…
Read more

which sql server recovery model

What is a SQL Server Recovery Model?

When we meet with clients for an initial SQL Server Health Check, we’re sometimes asked what a SQL Server recovery model is. Once explained, the natural follow up question often is: well, then which recovery model should we use? In this post, we will address both of these important questions. What is a SQL Server…
Read more

SQL Server DBA celebration

Preview Our New SQL Server Daily Health Check in an Upcoming Focus Group

Our team has been hard at work building the new SQL Server Daily Health Check Email and Dashboard. It’s designed to proactively deliver the information needed to keep your SQL Server environment healthy, secure, reliable, and running smoothly. And, we’d like your feedback on it. How the new SQL Server Daily Health Check works Here’s…
Read more

SEROShield SQL Server dashboard

Coming Soon: The All-New SQL Server Daily Health Check and Dashboard

SQL Server is a critical component for many businesses, and its health and performance can have a significant impact on operations. If SQL Server is having a bad day, a lot of people are having a bad day. Users, patients, loan officers, etc, and of course, IT. That’s why we recommend performing a SQL Server…
Read more

archiving data in sql server

Archiving and Deletion Strategy…KonMari for Data Management?

Welcome to the third and final post in our series on Data Lifecycle Management (DLM), where we will talk about archiving and purging company data. In the last post, we talked about applying the Kaizen approach to data management to achieve a culture of continuous improvement on our data teams. In this post, we will…
Read more

Secure Azure SQL Database

Recent Attacks on SQL Server VMs in Microsoft Azure

Poorly secured SQL Server VMs in Microsoft Azure are being attacked. And they are being used as a beachhead for additional exploits. According to a recent Microsoft warning, these attacks allow the bad actors to gain access to cloud resources without having to compromise the underlying infrastructure. How the attack works In the warning, Microsoft…
Read more

enhanced data security

5 Reasons You Should Use SQL Audit to Enhance Database Security

We know better than to click a link from the son of an unfairly deposed Nigerian Prince who needs our help. Yet, according to Deloitte’s 2023 Global Risk Management Survey, 91% of all cyberattacks begin with a phishing email. And many of them are successful. No business or industry is off limits. So, it’s important…
Read more

DB#JAMMER targets SQL Server

DB#JAMMER is Targeting Poorly Secured SQL Servers

SQL Server is being targeted again. This attack is called DB#JAMMER. And it’s targeting poorly secured SQL Servers. What’s happening? Attackers begin by brute-forcing access into poorly secured SQL Servers. Once they have gained access, the attackers use xp_cmdshell to deploy tools. They manipulate the firewall, if needed, and transfer files to and from the…
Read more