How-To Guide

Here you can find an information tutorials and “how-to” guides for CloudBerry Lab products.

How to Back Up iCloud Drive on macOS

If you’re an avid user of macOS or iOS, it’s safe to to bet that some of your workflow revolves around iCloud. Whether it’s some Xcode project or a Keynote presentation, it’s likely that some, if not most, of your data resides in iCloud. The significance of this data could not be overstated and thus it makes sense to consider some sort of backup for it to ensure that you’re not caught off guard if something disastrous happens at Apple’s data centers.

Continue reading

Guide to SQL Server Transaction Log Backup

T-Log backup

Production SQL Server databases generally require that data loss can be minimized in the event of the disaster. The amount of data loss is something that every administrator will need to understand from the business users who rely on the database. Whatever the answer, the solution is to manage your recovery point objectives (RPOs) through properly scheduled transaction log backups.

In this article, we’ll discuss how to create and manage your transaction log (T-Log) backups on Microsoft SQL Server 2017. Continue reading

Guide to Office 365 Mailbox Backup

Office 365 mailbox backup: secure your mailboxes data

Office 365 provides a corporate-grade business environment for small companies and increased infrastructure flexibility for businesses with on-premises servers. We are going to cover Office 365 infrastructure basics, discuss whether built-in data protection tools cover all your backup needs, and how to back up Office 365 in more convenient ways. Continue reading

Why CloudBerry Drive May Not Be the Best Solution for Your Business

CloudBerry Drive is a great solution for day-to-day file transactions between the local computer and the cloud. Being conveniently integrated in Windows Explorer, it provides seamless experience with most cloud storage services. However, to get the best out of CloudBerry Drive, it's crucial to know its proper use-cases as well as when not to use it.

Continue reading

How to Use S3 Select to Save Time on Amazon S3

The advent of cloud computing has led to an explosion in the use of data to better understand business performance and user behavior. The combination of instantly-available compute via services like EC2 plus infinitely-scalable storage via S3 means that it’s easier than ever to store and analyze larger and larger amounts of data.

But this revolution comes at a cost. As the size of our stored data continues to grow, it becomes more and more expensive -- both in terms of processing time and in bandwidth costs -- to analyze and find insights in our data.

In this post, you will learn about S3 Select, a feature announced by AWS in 2017 to allow you to retrieve subsets of data from an object on S3. We will discuss why you would want to use S3 Select, then walk through a simple use case of how to use S3 Select with Boto 3, the AWS SDK for Python. Continue reading

Two-Factor Authentication: Solutions, Methods, Best Practices

With new data breaches being uncovered every week or two, many companies are desperate to improve security for their clients. The old standard of a user login and password is no longer considered very safe, even with a long, complex password and a login that is not simply firstname_lastname@companydomain.com.  

Continue reading

Varying Tiers in the MSP Help Desk — Building Your Support System

MSP help desk structure

The reach of managed IT services has grown tremendously, thanks to the persistent expansion of the global tech market. As the demand for MSPs continues to increase, many prospective small business owners have chosen to enter this arena and build their own firms. There are several planning phases required in order to launch an organization and eventually become profitable. Perhaps the most daunting aspects are establishing an MSP help desk and selecting the perfect support team structure. They can be key components in achieving company objectives. Continue reading

Using Amazon S3 Pre-Signed URLs for Temporary Object Access

Protecting your S3 buckets is a critical security measure when using AWS. There have been numerous bad stories about unprotected S3 buckets, from established contractors like Accenture and Booz Allen Hamilton, to huge companies like Verizon Wireless and Time Warner Cable.

In this article, we'll learn how and why to use pre-signed S3 URLs to provide secure, temporary access to objects in your S3 buckets. We will discuss generating pre-signed S3 URLs for occasional, one-off use cases as well as programmatically generating them for use in yourapplication code. There are multiple code examples for each use case. Continue reading

Penetration Testing as an Offer: Why Should MSPs Conduct Security Testing?

Penetration Testing for MSPs

If you’re a managed service provider (MSP), your clients might ask your company to conduct penetration testing. Should you be ready to do so? And why is providing penetration testing in the best interests of an MSP? Let's take a look. Continue reading