In the 8th episode of MSP Voice, we are joined by Kevin Bissinger from Dentek Systems, Inc.
Dentek Systems, Inc. (DSI) was founded in Richardson, Texas circa 2002 as a turnkey Information Technology and Audio/Video solutions provider. We offer an array of services and support for new and existing small to mid-size companies. We specialize primarily in the healthcare industry, however, we have experience with a wide variety of professional and residential projects.
This is also the very first episode to feature our new rubric - the Best of Reddit where we choose the most interesting (in our opinion) topics from r/MSP subreddit. Check the 8th episode of the MSP Voice under the cut!
Today we're excited to announce our upcoming product — CloudBerry Managed Backup for iPhone and iPad. As CloudBerry MBS continues to evolve as a full-fledged software-as-a-service solution, it is only fitting that we enable our MSPs to track backup activity of their users on the go with the help of a mobile app.
On July 17, 2018, Amazon Web Services hosted an annual summit in New York. With more than 10,000 cloud computing practitioners, it was definitely one of the biggest AWS events. Here's a short recap of the conference from CloudBerry Lab.
Data leaks and ransomware infections are common threats nowadays, which you can avoid by using data encryption technologies. If no one can read your data, you do not need to be too afraid of its theft.
That is why it is becoming more popular to encrypt system drives. In this article, we are going to overview the BitLocker tool and a few of its alternatives. Continue reading
What is server hardening? There are many different ways for a hacker to attack a Windows server, from unpatched system vulnerabilities to misconfigured settings, unnecessary protocols, or vulnerable applications. The process of getting these vulnerabilities closed off or patched (or at least most of them) is server hardening Continue reading
You can never know when a disaster will occur to your cloud infrastructure. You can, however, prepare a cloud disaster recovery plan that enables you to restore operations quickly whenever disaster does strike your cloud. This article explains how. Continue reading
Choosing between NAS or iSCSI SAN is one of the cornerstones of modern data centers. The times when NAS was ridiculously slow to be used as a backend storage are gone. Now the choice is not so easy, so we are going to explain the main differences between NAS and iSCSI storage. Continue reading
CloudBerry Backup for macOS & Linux receives another major update that brings enhanced scheduling, retention policy as well as the ability to backup and restore plans.
Cybersecurity threats are constantly evolving. It’s absolutely necessary for businesses with internal or external networks to run intrusion detection and prevention systems, antivirus solutions with advanced malware detection heuristics, vulnerability monitoring, ensure regulatory compliance and maintain security information and event management systems. Continue reading
What Is Spear Phishing?
Spear phishing attacks are executed through the use of electronic or email communications. Targeted phishing may impact an individual, corporation or business, depending upon the objectives and intentions of its perpetrators. Cybercriminals may launch spear phishing attacks for the following reasons: Continue reading
A SAN is a key piece of technology in data storage in several types of infrastructure, but there are varying implementations and standards on the market. In this article, we are going to review the key differences between FC, FCoE and iSCSI in order to help you choose the best option. Continue reading