On July 17, 2018, Amazon Web Services hosted an annual summit in New York. With more than 10,000 cloud computing practitioners, it was definitely one of the biggest AWS events. Here's a short recap of the conference from CloudBerry Lab.
What is server hardening? There are many different ways for a hacker to attack a Windows server, from unpatched system vulnerabilities to misconfigured settings, unnecessary protocols, or vulnerable applications. The process of getting these vulnerabilities closed off or patched (or at least most of them) is server hardening Continue reading
What Is Spear Phishing?
Spear phishing attacks are executed through the use of electronic or email communications. Targeted phishing may impact an individual, corporation or business, depending upon the objectives and intentions of its perpetrators. Cybercriminals may launch spear phishing attacks for the following reasons: Continue reading
Recently we have performed a survey across CloudBerry Lab customers offering managed IT services to their clients to understand the current MSP market situation and essential needs better. More than 180 MSPs attended the survey and expressed their thoughts on the most vital aspects of the managed services market. And we are glad to present the result of this survey below as the infographics. We hope you will find it helpful. Continue reading
The MSP market is more competitive than ever before. With the current array of providers, crafting a unique competitive advantage and differentiating your services from others could be a significant challenge. You may have determined how to start a managed services company, but the next major hurdle and question you face is: How do we get managed services clients? Continue reading
Introduction: What is WORM compliance?
WORM (write once, read many), is a storage system concept. Developers designed it to protect information that an organization does not want to be destroyed or altered in any way. With WORM-compliant storage, you can transfer information to a storage device or cloud storage, but, once you transfer the information, it cannot be changed. WORM compliance also requires a second form of storage (at minimum) as a backup in the event that a drive is stolen or destroyed. Because WORM compliance demands that data be unalterable, in cases where access is necessary, that access is restricted to read-only. Continue reading
The foundation of a successful business is effective decision-making. From operational decisions that are made on a day-to-day basis and tactical decisions which are undertaken by mid-level managers to strategic decisions that are executed by members of top management, it is imperative to weigh the cost and benefits of any option before making a decision that can impact productivity and the bottom line. Continue reading
A cybercriminal could be just one email away from gaining complete access to your data. One phishing email can bypass most of your cybersecurity protocols and take over your networks, stealing all your most valuable data.
Cybercriminals have numerous tricks to convince potential email readers to open an attachment, click a link, or provide confidential information. From creating spam websites to uploading a harmful virus into your systems through emails, their tactics are constantly evolving, and it has become more difficult to counter these kinds of attacks with standard cybersecurity protocols. Continue reading
Microsoft OneDrive for Business is an online storage solution, with licenses starting at $5 per month. It makes sharing and collaborating on business files easy, with access available from all devices, powerful search tools, and advanced security features for maximum data protection.
In a dynamic and highly competitive IT services industry where companies can choose from hundreds or even thousands of managed service providers (MSPs) to cater to their end-user systems and IT infrastructure requirements, it is crucial for MSPs to have well-documented principles and policies to guide successful delivery of service.
Before finalizing a business partnership, it is important that the client and the company clearly define the ultimate goals that the collaboration should achieve, and this is precisely where the role of a Managed Services Service Level Agreement or MSP agreement comes into play. Continue reading