There’s a common misconception out there today: Linux is safe - Windows is not. This simply isn’t true. While there may be more vulnerabilities and risks out there for Windows operating systems - our ways of looking at this needs to change. Instead of looking at the chances of risk, a more binary approach needs to be taken. Continue reading
CloudBerry Lab Blog
In the last article, we went over the process of addressing a compromised account, taking the appropriate response actions to ensure the account is safe and back under the end user’s control.
Now, as a follow up to the previous article, we are going to review the actions needed to properly secure an Office 365 tenant. These steps are geared towards MSPs who manage multiple Office 365 tenants and require some level of automation to configure Office 365 tenants in bulk. Continue reading
Craig runs an MSP in the Los Angeles area and has been in business for 28 years. When they started out, FPA did Accounting systems, custom programming, and infrastructure support, now they basically just do infrastructure support (MSP). While FPA now has 25 staff members, Craig still does a majority of the sales and marketing. Continue reading
Microsoft Azure Blob Storage is one of the most popular solutions for storing backup data in the cloud. In this article, we provide an overview of using Azure Blob storage for backup. We explain Blob’s storage tier options, pricing, backup features and security essentials. We then conclude by explaining how to get started using Azure Storage for backup with CloudBerry Backup. Continue reading
We are proud to announce CloudBerry Backup 2.9 for macOS & Linux, the latest version of our product. Version 2.9 introduces a number of important features and enhancements. Learn more below.
Cyber attacks aimed at breaking through network monitoring defenses and raiding Industrial Control Systems (ICS) and mangling the Industrial Internet of Things (IIoT) is nothing new.
These kinds of attacks have been around since the first company website was launched. From stealing data to altering information to shutting down software and hardware, the threats are there and growing more sophisticated every day. Continue reading
Arismonty “Monty” is in the Dominican Republic and has built a business by just focusing on a few core services instead of trying to offer everything. With natural disasters like hurricanes and earthquakes, data protection and continuity services are their main offering. Eridani focuses on building trust with their clients and that is paying off in referrals. Continue reading
This week we have Jorge Prieto out of Texas. Jorge has been in services for 14 years and joined forces with his friend about 3 years ago and business has been great. Like most, Jorge started out with break-fix but now almost all of his clients are on a monthly contract. Continue reading
Attempts to infiltrate malware onto computers systems typically come from one of two sources: email and web sites. The most effective often use both. Phishes are one type of email used to attempt to get users to click on a link that will either get them to install malware or enter user credentials that can be used to infiltrate a real website. Continue reading
Heading out to California to work in the oil and gas industry, Joshua found himself jobless after an explosion in the refinery he was supposed to be working at. While doing odd jobs and temp work, he stumbled onto an opportunity setting up a PC for the temp agency. Working inside appealed to Joshua so he spent the rest of the summer doing PC setups. Continue reading
It’s never been more important to back up business data.
Data breaches are happening every day, and there aren’t any signs of attacks slowing down anytime soon.
Even though there are numerous ways to back up data, using cloud-based storage is becoming increasingly popular among businesses. Continue reading
For healthcare organizations, compliance is a major concern when deciding what to look for in a backup solution and cloud services. In this article, we will provide an overview of HIPAA basic principles, explain why the HIPAA regulation applies to cloud backup and discuss HIPAA-related backup requirements. We will also show how to create a HIPAA-compliant backup using CloudBerry software.