Since CloudBerry Backup supports file system repositories - apart from a wide range of cloud storage services - you may want to use it for PC-to-PC backups. In this article, we are going to show how to create a backup using a VPN-connected storage repository.Continue reading →
Should you back up data to the cloud? The answer will depend on a variety of factors specific to your situation, of course.
In general, however, cloud backups are a good idea. In most cases, you can benefit from cloud storage cost savings by performing backups in the cloud. There are other advantages of cloud backup, too, such as easier access to data.
This article explains why cloud backups can, in many cases, be more cost-effective, provide faster data restoration and deliver higher rates of availability than on-premise backups.Continue reading →
Encryption is everywhere: On your storage, on your network, over the internet, and in the cloud. Encryption is about protecting your data from those who might otherwise use it to cause harm. It protects you from those who bypass security to access data within your organization, illegal access from outside, and provides protection for compliance. Your live data is the lifeblood of your organization and your backups protect your live data by letting you restore misplaced, damaged, stolen, or incorrectly edited data with versions that keep the business running. Continue reading →
Businesses based in the European Union or businesses outside the EU working with EU citizen data are currently marking their calendars for May 25, 2018. That’s when GDPR is coming.
GDPR stands for General Data Protection Regulation and it’s a relatively new business data compliance regulation. It contains a whole range of new rules that companies may need to enact for proper compliance, as there are strict fines for non-compliance. Your business may be fined up to 4% of global annual turnover for your previous financial year or €20 million, depending on the larger amount.
You might think that US-based companies are not affected by these new regulations. But, you’d be wrong. If your company processes any EU citizen data, you need to be GDPR compliant.
In this article we will provide a general GDPR overview including main terms and regulations that you should be aware of.
One of the most annoying types of virus types nowadays, is Ransomware – malicious software that locks files or a computer until its owner pays a ransom for decryption. Windows users do a lot of things to protect their files, but how about for Macs? Should Mac users be worried about such virus types? In this article we are going to reveal the answer.Continue reading →
Backing up files in Linux may seem easy, but it is challenging to backup a Linux system in a reliable and efficient way.
That is because a typical Linux server contains many different types of files. Some are more important to back up than others, and some are easier to restore to a working state than others after the system goes down.
For this reason, if your Linux backup strategy simply involves copying all directories from the system to a backup server, it is unlikely that you will actually be able to recover all of your data after a failure. You also won’t be backing up data efficiently because a full-system backup will consume much more space than necessary.Continue reading →
Data loss can occur for a variety of reasons. A user may delete the data that he needs, part of the computer or the whole operating system may be crashed or the PC may be infected by a virus. But whatever is the reason, you as a managed service provider have to help your clients and offer them the swift recovery of their data. In this article, we would like to review 4 MSP best practices for data backup and recovery in Windows.Continue reading →
Mac users typically have a basic backup structure using a good, native tool called “Time Machine”. But there are a few thoughts on how to backup Mac that we want you to consider in order to make your backups more efficient and available anytime, anywhere for both personal or business needs.Continue reading →
Every day since the beginning of 2017 a whopping 4000 ransomware attacks occur every day. In this whitepaper, we’ll outline what your ransomware protection strategy should look like, highlighting the value of having a solid backup and recovery plan to ensure you can get the organization back into a state of operation as quickly as possible.
The Value of Backup
in your Ransomware Protection Strategy
In our last article, we described the recent situation with many organizations were hit by the WannaCry strain of ransomware – and the possible ways of retaliation. In some cases, organizations simply chose to pay the ransom of $300 – a mere pittance compared to the value of lost data. But WannaCry was not ransomware targeting businesses; instead, it was focused on impacting individuals. Thus, the extremely low ransom. In many ways, organizations hit by WannaCry were lucky.
But the next ransomware variant may not be so nice.