CloudBerry MBS offers native integration with a variety of remote management services like LabTech and ConnectWise. Today we're excited to announce the latest addition to our remote management partners — OptiTune. With it you'll be able to deploy CloudBerry MBS for Windows effortlessly as well as track backup and restore plans right from the OptiTune's dashboard.
For different usage scenarios, Amazon Web Services offers different storage classes. This allows to reduce the storage costs for data which is rarely used, and doesn’t require instant access. All the classes have a high level of reliability and support SSL data encryption during transmission, but differ by their cost. This article will outline where and which class is recommended for use, and what the difference between Amazon S3 storage classes is.
Should you back up data to the cloud? The answer will depend on a variety of factors specific to your situation, of course.
In general, however, cloud backups are a good idea. In most cases, you can benefit from cloud storage cost savings by performing backups in the cloud. There are other advantages of cloud backup, too, such as easier access to data.
This article explains why cloud backups can, in many cases, be more cost-effective, provide faster data restoration and deliver higher rates of availability than on-premise backups.Continue reading →
Just recently one of our MSP clients - Kenny Grayson, the CEO of Grayson Data Services - was interviewed by Paul Thurrott from thurrott.com. Check out the recording to know about the real-life experience with CloudBerry Managed Backup Service.
Litigation hold may not be something that most IT professionals think about frequently. However, keeping digital data compliant with the requirements imposed by a litigation hold is essential for protecting an organization during legal proceedings.
This article explains what litigation hold means and how IT teams can respond when they receive a litigation hold notice for data that they manage.Continue reading →
Encryption is everywhere: On your storage, on your network, over the internet, and in the cloud. Encryption is about protecting your data from those who might otherwise use it to cause harm. It protects you from those who bypass security to access data within your organization, illegal access from outside, and provides protection for compliance. Your live data is the lifeblood of your organization and your backups protect your live data by letting you restore misplaced, damaged, stolen, or incorrectly edited data with versions that keep the business running. Continue reading →
In a recent blog post, we reviewed the main terms and definitions in the upcoming General Data Protection Regulation (GDPR). For those of you who do not yet know about these new EU compliance regulations, please refer to our GDPR Overview.
GDPR brings several major data management requirements for all businesses that deal with data of EU citizens, including businesses that do not operate in the European Union, but process or store data of any person from the EU.
Businesses based in the European Union or businesses outside the EU working with EU citizen data are currently marking their calendars for May 25, 2018. That’s when GDPR is coming.
GDPR stands for General Data Protection Regulation and it’s a relatively new business data compliance regulation. It contains a whole range of new rules that companies may need to enact for proper compliance, as there are strict fines for non-compliance. Your business may be fined up to 4% of global annual turnover for your previous financial year or €20 million, depending on the larger amount.
You might think that US-based companies are not affected by these new regulations. But, you’d be wrong. If your company processes any EU citizen data, you need to be GDPR compliant.
In this article we will provide a general GDPR overview including main terms and regulations that you should be aware of.
One of the most annoying types of virus types nowadays, is Ransomware – malicious software that locks files or a computer until its owner pays a ransom for decryption. Windows users do a lot of things to protect their files, but how about for Macs? Should Mac users be worried about such virus types? In this article we are going to reveal the answer.Continue reading →
Businesses across industries are increasingly moving toward the cloud. The simplicity and flexibility of configuring a virtual server room make it a no-brainer to incorporate services like Amazon S3 and EC2 into the companies’ IT infrastructure. But with major shifts, new challenges and vulnerabilities arise that need to be addressed. It is critical to ensure that security concerns are taken care of, and bills remain under control. With that in mind, let’s take a quick look at a few solutions that you can use for cloud cost optimization.Continue reading →