This article is the first in a series. In this part, we will cover building the backup infrastructure for a small team of 15 people or less, that is running their computer systems primarily on in-house hardware – a server or NAS, and PCs for each user. Continue reading
For IT PROs
Modern hackers now look to take advantage of the mining boom by building malware that can hijack one or more systems and remotely use the hardware for financial gain. Such attacks are known as cryptojacking and continue to affect more and more internet users. Continue reading
We receive a number of questions about which backup type to choose: an incremental or a differential backup. The answer is - it depends. In this article, we will review the difference between an incremental and a differential backup and provide advice on the usage of both. Continue reading
I work at CloudBerry, but I'm also a CloudBerry user. Like many of you, I need to protect both my work and my personal files, but I have different needs for each when it comes to what I need to be able to restore. What follows are my preferred retention settings for work and personal backups. Continue reading
If you want to make the most of the AWS cloud, then, Amazon EC2 and Amazon S3 are both important services to understand. This article explains what each service does, how you can use them together and which additional AWS services (such as EFS and EBS) you might wish to use in conjunction with EC2 and S3.
In this article, we cover the topic of how to purge Exchange logs in case you are running out of the log disk space, and there is no way to create a full regular backup instead.
Exchange Server brick-level backup means backing up the smallest available information objects (mailbox items), and there are a few things you should know about these “bricks”.
This is the third article in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we looked at writing identity-based policies to manage access to your S3 resources. In this Part III, we will cover authentication and identity within the context of AWS Identity and Access Management (IAM). Continue reading