Latest posts

Change layout

Geo-Redundancy Clash: Amazon S3, Microsoft Azure Blob and Google Cloud Storage

Geo-Redundancy Clash: Amazon S3, Microsoft Azure Blob and Google Cloud Storage

Want to take advantage of geo-redundant storage but are unsure where to start? This article is for you. Below, we compare AWS replication across regions, Azure storage geo-redundancy and the data replication features available on Google Cloud Storage. Continue reading

How to Prevent Spear Phishing Attacks

How to Prevent Spear Phishing Attacks

Spear phishing attacks are executed through the use of electronic or email communications. Targeted phishing may impact an individual, corporation or business, depending upon the objectives and intentions of its perpetrators. Cybercriminals may launch spear-phishing attacks for the following reasons: Continue reading

NAS Backup Strategy: Local, Cloud and Hybrid Backup

NAS Backup Strategy: Local, Cloud and Hybrid Backup

Unlike typical external hard drives, NAS devices provide built-in operating systems that support features like remote access, printer streaming, or native media streaming. Additionally, you can save images, server data, application databases, and so forth without any supplementary management device.   Continue reading

QNAP Cloud Backup: Best Practices, Software to Use

QNAP Cloud Backup: Best Practices, Software to Use

A QNAP NAS is a great way to keep data safe and available. But the fact is that even if you have data redundancy built into the NAS, it’s still important to perform QNAP cloud backups as well in order to back up your NAS data to a remote location. Not only does backing up QNAP data to the cloud help you to meet the requirements of the 3-2-1 backup rule, but it may also be required by compliance regulations. Continue reading

Linux Server Hardening: Best Practices

Linux Server Hardening: Best Practices

There’s a common misconception out there today: Linux is safe - Windows is not. This simply isn’t true. While there may be more vulnerabilities and risks out there for Windows operating systems - our ways of looking at this needs to change. Instead of looking at the chances of risk, a more binary approach needs to be taken. Continue reading

Securing Your Office 365 Tenants. Part 1

Securing Your Office 365 Tenants. Part 1

In the last article, we went over the process of addressing a compromised account, taking the appropriate response actions to ensure the account is safe and back under the end user’s control.

Now, as a follow up to the previous article, we are going to review the actions needed to properly secure an Office 365 tenant. These steps are geared towards MSPs who manage multiple Office 365 tenants and require some level of automation to configure Office 365 tenants in bulk. Continue reading

How To Detect and Defend Against Triton Malware

How To Detect and Defend Against Triton Malware

How To Detect and Defend Against Triton Malware

Cyber attacks aimed at breaking through network monitoring defenses and raiding Industrial Control Systems (ICS) and mangling the Industrial Internet of Things (IIoT) is nothing new.

These kinds of attacks have been around since the first company website was launched. From stealing data to altering information to shutting down software and hardware, the threats are there and growing more sophisticated every day. Continue reading