Businesses across industries are increasingly moving toward the cloud. The simplicity and flexibility of configuring a virtual server room make it a no-brainer to incorporate services like Amazon S3 and EC2 into the companies’ IT infrastructure. But with major shifts, new challenges and vulnerabilities arise that need to be addressed. It is critical to ensure that security concerns are taken care of, and bills remain under control. With that in mind, let’s take a quick look at a few solutions that you can use for cloud cost optimization.Continue reading →
Once you have used a cloud storage service, you are most likely going to be faced with its different types: block-, file- and object storage. These types determine how data is stored and used. We are going to explain in depth, one of the most commonly used storage types – object storage.Continue reading →
In 2017 we have performed a survey across US-citizens to understand the current impact of ransomware. We have created infographics below as a result of this survey. It contains most interesting numbers and findings.
When most people hear “data storage,” they think about conventional file level storage. The storage solutions used by typical end users are file systems that are mapped to individual hard drives.
However, file systems are only one way to organize data. Another popular method -- and one that is particularly useful when setting up virtual machine storage, network attached storage and SAN storage -- is block storage.
This article defines block storage, discusses common block storage use cases and explains what makes block storage different from file level storage.Continue reading →
How does ransomware work? If you think that ransomware works in the same way as other types of cyberattacks, you may be overlooking important steps for protecting yourself against it.
Ransomware works differently from other malware threats. Traditional security tools like antivirus scanners and firewalls are of limited use against ransomware. To combat ransomware effectively, you need to understand the complex nature of different types of ransomware attacks, then create processes -- such as strategic data backups -- to protect yourself against ransomware. Tools alone won’t keep you safe.
This article helps you defend yourself against ransomware by assessing the current state of ransomware threats and discussing the latest developments in ransomware design.Continue reading →
In a perfect world, you would have an automated data backup and recovery solution in place for all of your data so that you never need to worry about losing data.
In the real world, however, you may sometimes experience data loss without having a data backup in place. For example, you may have a disk drive that begins to fail and contains data that is not backed up, or you may accidentally delete files that have not yet been written to a backup location.
Fortunately, it is sometimes possible to recover data in situations like this. Several free data recovery software can help you to restore data even from disks that are damaged, or after you have erased data from your file system.
This article provides an overview of free data recovery tools and explains what each one can do to help you recover data after a data loss.Continue reading →
Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.Continue reading →
A disaster could hardly be planned, but disaster recovery planning is a must. The core of successful disaster recovery is, of course, backup.
Nowadays, cloud storage providers are widely used for storing backups. However, the biggest cloud storage providers have created various services to perform recovery in the cloud. Today we will discuss the need for disaster recovery in the cloud and its peculiarities.Continue reading →
What could possibly be easier - to perform a backup? Many things, actually. There are lots of forms of backup and additional features, that might help you to achieve exactly your needs. In this article, we are covering the differences between the most popular types of backup:
AWS offers nearly fifty different types of EC2 instances. It also provides a number of different categories of images, each tailored for different use cases.
Choice is a good thing, and having so many EC2 instance typesand categories is a benefit to users. But with so many possibilities, deciding which EC2 instance is the best fit for your needs can be a challenge.
If you’re struggling to decide which EC2 instance to use, this article is for you. It outlines the major EC2 instance types and categories and makes recommendations about which instances are the best fit for certain types of situations.
We won’t discuss every individual instance type. That would be unfeasible, because Amazon currently offers forty-nine distinct EC2 instances. But we’ll cover the most important ones, and discuss the differences between the major categories of EC2 instances.