CloudBerry Lab Blog

Latest posts

Securing Your Office 365 Tenants. Part 1

Securing Your Office 365 Tenants. Part 1

In the last article, we went over the process of addressing a compromised account, taking the appropriate response actions to ensure the account is safe and back under the end user’s control.

Now, as a follow up to the previous article, we are going to review the actions needed to properly secure an Office 365 tenant. These steps are geared towards MSPs who manage multiple Office 365 tenants and require some level of automation to configure Office 365 tenants in bulk. Continue reading

MSP Voice Episode 47 – “Is Anybody a True MSP?” with Craig Pollack

MSP Voice Episode 47 – “Is Anybody a True MSP?” with Craig Pollack

Craig runs an MSP in the Los Angeles area and has been in business for 28 years. When they started out, FPA did Accounting systems, custom programming, and infrastructure support, now they basically just do infrastructure support (MSP). While FPA now has 25 staff members, Craig still does a majority of the sales and marketing. Continue reading

Azure as a Backup Storage Destination

Azure as a Backup Storage Destination

Microsoft Azure Blob Storage is one of the most popular solutions for storing backup data in the cloud. In this article, we provide an overview of using Azure Blob storage for backup. We explain Blob’s storage tier options, pricing, backup features and security essentials. We then conclude by explaining how to get started using Azure Storage for backup with CloudBerry Backup. Continue reading

How To Detect and Defend Against Triton Malware

How To Detect and Defend Against Triton Malware

How To Detect and Defend Against Triton Malware

Cyber attacks aimed at breaking through network monitoring defenses and raiding Industrial Control Systems (ICS) and mangling the Industrial Internet of Things (IIoT) is nothing new.

These kinds of attacks have been around since the first company website was launched. From stealing data to altering information to shutting down software and hardware, the threats are there and growing more sophisticated every day. Continue reading

podcast featured image

MSP Voice Episode 46 – “Preparing for Disaster“ with Arismonty Beato

MSP Voice Episode 46 – “Preparing for Disaster“ with Arismonty Beato

Arismonty “Monty” is in the Dominican Republic and has built a business by just focusing on a few core services instead of trying to offer everything. With natural disasters like hurricanes and earthquakes, data protection and continuity services are their main offering. Eridani focuses on building trust with their clients and that is paying off in referrals. Continue reading

podcast featured image

MSP Voice Episode 45 – “It’s not 9 to 5” with Jorge Prieto

MSP Voice Episode 45 – “It’s not 9 to 5” with Jorge Prieto

This week we have Jorge Prieto out of Texas. Jorge has been in services for 14 years and joined forces with his friend about 3 years ago and business has been great. Like most, Jorge started out with break-fix but now almost all of his clients are on a monthly contract. Continue reading

Clone Phishing Explained

Clone Phishing Explained

Clone Phishing Explained

Attempts to infiltrate malware onto computers systems typically come from one of two sources: email and web sites. The most effective often use both. Phishes are one type of email used to attempt to get users to click on a link that will either get them to install malware or enter user credentials that can be used to infiltrate a real website. Continue reading

podcast featured image

MSP Voice Episode 44 – “Securing Albuquerque” with Joshua Liberman

MSP Voice Episode 44 – “Securing Albuquerque” with Joshua Liberman

Heading out to California to work in the oil and gas industry, Joshua found himself jobless after an explosion in the refinery he was supposed to be working at. While doing odd jobs and temp work, he stumbled onto an opportunity setting up a PC for the temp agency. Working inside appealed to Joshua so he spent the rest of the summer doing PC setups. Continue reading

Why Cloud-Based Storage Is Better Than Traditional Storage

Why Cloud-Based Storage Is Better Than Traditional Storage

It’s never been more important to back up business data.

Data breaches are happening every day, and there aren’t any signs of attacks slowing down anytime soon.

Even though there are numerous ways to back up data, using cloud-based storage is becoming increasingly popular among businesses. Continue reading

HIPAA-Compliant Cloud Backup

HIPAA-Compliant Cloud Backup

For healthcare organizations, compliance is a major concern when deciding what to look for in a backup solution and cloud services. In this article, we will provide an overview of HIPAA basic principles, explain why the HIPAA regulation applies to cloud backup and discuss HIPAA-related backup requirements. We will also show how to create a HIPAA-compliant backup using CloudBerry software.

Continue reading