RTO and RPO (recovery time objective and recovery point objective) are two key metrics that organizations must consider in order to develop an appropriate disaster recovery plan that can maintain business continuity after an unexpected event. Continue reading
Type: How-To Guide
Not every business is large enough to have its own CIO, so instead of employing someone, an MSP or a contractor is oftentimes hired to fill the role. While MSPs are properly trained in the services and offerings they provide, they aren’t always well equipped to tackle the business challenges CIOs face daily. By understanding how CIOs transform businesses, managed services providers can improve the ways in which they manage technical environments and deliver business results effectively as vCIOs. Continue reading
Spear phishing attacks are executed through the use of electronic or email communications. Targeted phishing may impact an individual, corporation or business, depending upon the objectives and intentions of its perpetrators. Cybercriminals may launch spear-phishing attacks for the following reasons: Continue reading
Unlike typical external hard drives, NAS devices provide built-in operating systems that support features like remote access, printer streaming, or native media streaming. Additionally, you can save images, server data, application databases, and so forth without any supplementary management device. Continue reading
A QNAP NAS is a great way to keep data safe and available. But the fact is that even if you have data redundancy built into the NAS, it’s still important to perform QNAP cloud backups as well in order to back up your NAS data to a remote location. Not only does backing up QNAP data to the cloud help you to meet the requirements of the 3-2-1 backup rule, but it may also be required by compliance regulations. Continue reading
There’s a common misconception out there today: Linux is safe - Windows is not. This simply isn’t true. While there may be more vulnerabilities and risks out there for Windows operating systems - our ways of looking at this needs to change. Instead of looking at the chances of risk, a more binary approach needs to be taken. Continue reading
In the last article, we went over the process of addressing a compromised account, taking the appropriate response actions to ensure the account is safe and back under the end user’s control.
Now, as a follow up to the previous article, we are going to review the actions needed to properly secure an Office 365 tenant. These steps are geared towards MSPs who manage multiple Office 365 tenants and require some level of automation to configure Office 365 tenants in bulk. Continue reading
BackBlaze B2 cloud storage has launched a data import program - the BackBlaze Fireball. It helps to upload large volumes of data using a physical appliance, shipped to the customer. This is a step-by-step guide on how to set up BackBlaze B2 Fireball and synchronize data with it. Continue reading
If you run Microsoft SQL Server, you may wish to back up your databases to a cloud like Amazon Web Services (AWS). Doing so not only provides you with a virtually infinite amount of backup storage space in the cloud, but it can also make recovery easy in cases where you decide to restore your database using a cloud-based server.
In this article, we explain the main options available to you for backing up SQL Server databases to AWS. In particular, we’ll discuss backing up your data manually from a SQL Server database into S3, backing up data to AWS RDS and, finally, how to perform an image-based backup with the help of CloudBerry Backup.
This is the third in a three-part series covering the Amazon Web Services (AWS) free tier. In our previous articles, we reviewed the free tier for the AWS compute and database offerings. In this article, you will learn about the messaging options provided by AWS. We will cover Amazon Simple Queue Service (SQS), Amazon Simple Notification Service (SNS), and Amazon Simple Email Service (SES). Continue reading