For IT PROs

Latest posts

Securing Your Office 365 Tenants. Part 1

Securing Your Office 365 Tenants. Part 1

In the last article, we went over the process of addressing a compromised account, taking the appropriate response actions to ensure the account is safe and back under the end user’s control.

Now, as a follow up to the previous article, we are going to review the actions needed to properly secure an Office 365 tenant. These steps are geared towards MSPs who manage multiple Office 365 tenants and require some level of automation to configure Office 365 tenants in bulk. Continue reading

How To Detect and Defend Against Triton Malware

How To Detect and Defend Against Triton Malware

How To Detect and Defend Against Triton Malware

Cyber attacks aimed at breaking through network monitoring defenses and raiding Industrial Control Systems (ICS) and mangling the Industrial Internet of Things (IIoT) is nothing new.

These kinds of attacks have been around since the first company website was launched. From stealing data to altering information to shutting down software and hardware, the threats are there and growing more sophisticated every day. Continue reading

Clone Phishing Explained

Clone Phishing Explained

Clone Phishing Explained

Attempts to infiltrate malware onto computers systems typically come from one of two sources: email and web sites. The most effective often use both. Phishes are one type of email used to attempt to get users to click on a link that will either get them to install malware or enter user credentials that can be used to infiltrate a real website. Continue reading

Why Cloud-Based Storage Is Better Than Traditional Storage

Why Cloud-Based Storage Is Better Than Traditional Storage

It’s never been more important to back up business data.

Data breaches are happening every day, and there aren’t any signs of attacks slowing down anytime soon.

Even though there are numerous ways to back up data, using cloud-based storage is becoming increasingly popular among businesses. Continue reading

HIPAA-Compliant Cloud Backup

HIPAA-Compliant Cloud Backup

For healthcare organizations, compliance is a major concern when deciding what to look for in a backup solution and cloud services. In this article, we will provide an overview of HIPAA basic principles, explain why the HIPAA regulation applies to cloud backup and discuss HIPAA-related backup requirements. We will also show how to create a HIPAA-compliant backup using CloudBerry software.

Continue reading

What Is Amazon S3 Glacier and How to Use It

What Is Amazon S3 Glacier and How to Use It

Amazon S3 is one of the core services offered by AWS. It is rightly marketed as “storage for the internet”. It has a wide variety of use cases, from serving static websites to hosting images, managing data lakes, and much more.

In this post, we will review the ins and outs of S3 Glacier. S3 Glacier is a special storage class of Amazon S3 that provides extremely cheap storage. Continue reading

Choosing a NAS Article Header

Choosing a NAS Backup Solution for SMBs

Choosing a NAS Backup Solution for SMBs

For small and medium-sized businesses Network-Attached Storage (NAS) is a convenient and cost-effective storage solution. NAS devices make it easy to expand the amount of storage available to your workstations and servers while keeping the data on your own infrastructure and local network. NAS devices also usually make it easy to configure redundant storage using RAID arrays or a similar technique.

Continue reading

SAN vs NAS: Difference Between Storage Area Network and Network Attached Storage

SAN vs NAS: Difference Between Storage Area Network and Network Attached Storage

When you are looking for a local storage for business, there come two options: NAS (Network Attached Storage) and SAN (Storage Area Network). Today you will find out whether it is NAS or SAN that fits your needs.

Continue reading