CloudBerry Lab Blog

Latest posts

MSP Voice Episode 48 – 1 Year Anniversary – “Talking YouTube” with Tom Lawrence

MSP Voice Episode 48 – 1 Year Anniversary – “Talking YouTube” with Tom Lawrence

This is our 1 year anniversary week for the MSP Voice podcast!

And this week I was thrilled to have Tom Lawrence back on the podcast. Tom was our first guest and also our most popular. We calculated our top 10 episodes/guests for the first year and Tom came out on top!

Continue reading

Azure Blob Storage Tiers Explained

Azure Blob Storage Tiers Explained

Azure Blob Storage offers an opportunity for organizations that store data in Azure to minimize cloud storage costs. For that, Microsoft has developed access tiers for your data. Below, we compare and contrast the different Azure storage tiers available and explain which storage tiers to use under which conditions in order to strike the right balance between data availability and price.
Continue reading

Securing Your Office 365 Tenants. Part 1

Securing Your Office 365 Tenants. Part 1

In the last article, we went over the process of addressing a compromised account, taking the appropriate response actions to ensure the account is safe and back under the end user’s control.

Now, as a follow up to the previous article, we are going to review the actions needed to properly secure an Office 365 tenant. These steps are geared towards MSPs who manage multiple Office 365 tenants and require some level of automation to configure Office 365 tenants in bulk. Continue reading

podcast featured image

MSP Voice Episode 47 – “Is Anybody a True MSP?” with Craig Pollack

MSP Voice Episode 47 – “Is Anybody a True MSP?” with Craig Pollack

Craig runs an MSP in the Los Angeles area and has been in business for 28 years. When they started out, FPA did Accounting systems, custom programming, and infrastructure support, now they basically just do infrastructure support (MSP). While FPA now has 25 staff members, Craig still does a majority of the sales and marketing. Continue reading

Azure as a Backup Storage Destination

Azure as a Backup Storage Destination

Microsoft Azure Blob Storage is one of the most popular solutions for storing backup data in the cloud. In this article, we provide an overview of using Azure Blob storage for backup. We explain Blob’s storage tier options, pricing, backup features and security essentials. We then conclude by explaining how to get started using Azure Storage for backup with CloudBerry Backup. Continue reading

How To Detect and Defend Against Triton Malware

How To Detect and Defend Against Triton Malware

How To Detect and Defend Against Triton Malware

Cyber attacks aimed at breaking through network monitoring defenses and raiding Industrial Control Systems (ICS) and mangling the Industrial Internet of Things (IIoT) is nothing new.

These kinds of attacks have been around since the first company website was launched. From stealing data to altering information to shutting down software and hardware, the threats are there and growing more sophisticated every day. Continue reading

podcast featured image

MSP Voice Episode 46 – “Preparing for Disaster“ with Arismonty Beato

MSP Voice Episode 46 – “Preparing for Disaster“ with Arismonty Beato

Arismonty “Monty” is in the Dominican Republic and has built a business by just focusing on a few core services instead of trying to offer everything. With natural disasters like hurricanes and earthquakes, data protection and continuity services are their main offering. Eridani focuses on building trust with their clients and that is paying off in referrals. Continue reading

podcast featured image

MSP Voice Episode 45 – “It’s not 9 to 5” with Jorge Prieto

MSP Voice Episode 45 – “It’s not 9 to 5” with Jorge Prieto

This week we have Jorge Prieto out of Texas. Jorge has been in services for 14 years and joined forces with his friend about 3 years ago and business has been great. Like most, Jorge started out with break-fix but now almost all of his clients are on a monthly contract. Continue reading

Clone Phishing Explained

Clone Phishing Explained

Clone Phishing Explained

Attempts to infiltrate malware onto computers systems typically come from one of two sources: email and web sites. The most effective often use both. Phishes are one type of email used to attempt to get users to click on a link that will either get them to install malware or enter user credentials that can be used to infiltrate a real website. Continue reading

podcast featured image

MSP Voice Episode 44 – “Securing Albuquerque” with Joshua Liberman

MSP Voice Episode 44 – “Securing Albuquerque” with Joshua Liberman

Heading out to California to work in the oil and gas industry, Joshua found himself jobless after an explosion in the refinery he was supposed to be working at. While doing odd jobs and temp work, he stumbled onto an opportunity setting up a PC for the temp agency. Working inside appealed to Joshua so he spent the rest of the summer doing PC setups. Continue reading