CloudBerry Lab, the leading provider of multi-cloud data backup and recovery solutions, has announced rebranding under the new name MSP360 and the appointment of Brian Helwig as CEO. Continue reading
Many backup and disaster recovery (BDR) vendors in the market host backups in their own clouds. While this doesn’t sound like a big deal, it can be, especially when considering control, security, and pricing.
You can never know when a disaster will occur to your cloud infrastructure. You can, however, prepare a cloud disaster recovery plan that enables you to restore operations quickly whenever disaster does strike your cloud. This article explains how. Continue reading
Want to take advantage of geo-redundant storage but are unsure where to start? This article is for you. Below, we compare AWS replication across regions, Azure storage geo-redundancy and the data replication features available on Google Cloud Storage. Continue reading
RTO and RPO (recovery time objective and recovery point objective) are two key metrics that organizations must consider in order to develop an appropriate disaster recovery plan that can maintain business continuity after an unexpected event. Continue reading
Spear phishing attacks are executed through the use of electronic or email communications. Targeted phishing may impact an individual, corporation or business, depending upon the objectives and intentions of its perpetrators. Cybercriminals may launch spear-phishing attacks for the following reasons: Continue reading
Unlike typical external hard drives, NAS devices provide built-in operating systems that support features like remote access, printer streaming, or native media streaming. Additionally, you can save images, server data, application databases, and so forth without any supplementary management device. Continue reading
A QNAP NAS is a great way to keep data safe and available. But the fact is that even if you have data redundancy built into the NAS, it’s still important to perform QNAP cloud backups as well in order to back up your NAS data to a remote location. Not only does backing up QNAP data to the cloud help you to meet the requirements of the 3-2-1 backup rule, but it may also be required by compliance regulations. Continue reading
There’s a common misconception out there today: Linux is safe - Windows is not. This simply isn’t true. While there may be more vulnerabilities and risks out there for Windows operating systems - our ways of looking at this needs to change. Instead of looking at the chances of risk, a more binary approach needs to be taken. Continue reading
In the last article, we went over the process of addressing a compromised account, taking the appropriate response actions to ensure the account is safe and back under the end user’s control.
Now, as a follow up to the previous article, we are going to review the actions needed to properly secure an Office 365 tenant. These steps are geared towards MSPs who manage multiple Office 365 tenants and require some level of automation to configure Office 365 tenants in bulk. Continue reading
Cyber attacks aimed at breaking through network monitoring defenses and raiding Industrial Control Systems (ICS) and mangling the Industrial Internet of Things (IIoT) is nothing new.
These kinds of attacks have been around since the first company website was launched. From stealing data to altering information to shutting down software and hardware, the threats are there and growing more sophisticated every day. Continue reading