Resources

Allocating CloudBerry Backup VM socket licenses


CloudBerry Backup VM edition by default comes with two processor socket licenses included, meaning that you can only backup your virtual machines from tte hypervisor that has no more than two physical processors. If your hypervisor incorporates three or more physical processors, you'll have to purchase an extra processor socket license for each processor. In this article we will explain how to purchase said socket licenses and attach them to your main CloudBerry Backup VM edition license.

Continue reading

5 Reasons Why MSPs Should Offer Online Managed Backup Services

why you should offer online managed backup

If you’ve already decided to start an MSP business, then you’ve made the right choice. The current market for IT managed service providers is constantly growing with more and more opportunities arising every single day.

That said, using an online backup service as an MSP is hands down one of the best ways to provide quality service to your clientele. That’s because online backup services allow you to ardently secure your clients' data by keeping reserve copies of your clients’ critical files, folders, and hard drives on a remote server or in a cloud storage platform like Amazon S3 or Microsoft Azure. Perhaps more importantly, when a service provider offers backup-as-a-service to his clients, he/she can always help to restore that data whenever the client needs it.

Securely storing your customer's data to a preferred cloud provider has numerous advantages than simply backing up the data to a local storage location. Let's take a closer look at these benefits below. Continue reading

What Is Block Storage?

What is block storage?

When most people hear “data storage,” they think about conventional file level storage. The storage solutions used by typical end users are file systems that are mapped to individual hard drives.

However, file systems are only one way to organize data. Another popular method -- and one that is particularly useful when setting up virtual machine storage, network attached storage and SAN storage -- is block storage.

This article defines block storage, discusses common block storage use cases and explains what makes block storage different from file level storage. Continue reading

The Value of Backup in your Ransomware Protections Strategy

whitepaper-value-of-backup-in-anti-ransomware-strategy

Every day since the beginning of 2017 a whopping 4000 ransomware attacks occur every day. In this whitepaper, we’ll outline what your ransomware protection strategy should look like, highlighting the value of having a solid backup and recovery plan to ensure you can get the organization back into a state of operation as quickly as possible.

Continue reading

Ransomware Is Even More Dangerous than You Think

How does ransomware works

How does ransomware work? If you think that ransomware works in the same way as other types of cyberattacks, you may be overlooking important steps for protecting yourself against it.

Ransomware works differently from other malware threats. Traditional security tools like antivirus scanners and firewalls are of limited use against ransomware. To combat ransomware effectively, you need to understand the complex nature of different types of ransomware attacks, then create processes -- such as strategic data backups -- to protect yourself against ransomware. Tools alone won’t keep you safe.

This article helps you defend yourself against ransomware by assessing the current state of ransomware threats and discussing the latest developments in ransomware design. Continue reading

4 Ways to Protect Against Ransomware with Backups

4 ways to protect against ransomware with backups

In our last article, we described the recent situation with many organizations were hit by the WannaCry strain of ransomware – and the possible ways of retaliation. In some cases, organizations simply chose to pay the ransom of $300 – a mere pittance compared to the value of lost data. But WannaCry was not ransomware targeting businesses; instead, it was focused on impacting individuals. Thus, the extremely low ransom.  In many ways, organizations hit by WannaCry were lucky.

But the next ransomware variant may not be so nice.

Continue reading

Free Data Recovery Software

free data recovery software header

In a perfect world, you would have an automated data backup and recovery solution in place for all of your data so that you never need to worry about losing data.

In the real world, however, you may sometimes experience data loss without having a data backup in place. For example, you may have a disk drive that begins to fail and contains data that is not backed up, or you may accidentally delete files that have not yet been written to a backup location.

Fortunately, it is sometimes possible to recover data in situations like this. Several free data recovery software can help you to restore data even from disks that are damaged, or after you have erased data from your file system.

This article provides an overview of free data recovery tools and explains what each one can do to help you recover data after a data loss. Continue reading

Recovery Time Objective (RTO) Explained

Recovery time objective (RTO) explained

The main aspect of every backup and recovery strategy is a balance of RTO and RPO objectives. They regard how quickly and precisely you will be able to get the data back if something goes wrong. In case of disaster, recovery time objective becomes one of the most valuable characteristics in the business planning.
Continue reading