Three Basic Steps to Avoid Hacker Attacks
In the wake of so many security breaches, each news report seems to always focus on two things and two things only: The number of...
Business Recovery: The 8 Step Program
Your business could use some additional revenue, and your clients could use some additional protection. It’s a vicious circle that only...
Exchange Server Down - You Only Have Minutes
You just got the call: your Exchange server is not sending or receiving email. Your one and only Exchange server. OK, this is bad. You...
Hosting providers should see backups as a managed service
You, no doubt, already back up your customers data, files and operating systems, but are you missing the boat on an opportunity to both...
The Great Debate - Image vs. File-Based Backups
As an advocate for your customers, it’s critically important to you that the solutions you implement have your customer’s best interest...
Peeling the Onion - How to Survive An IT Audit
An IT Audit is, generally speaking, a reactive activity. Some compelling event occurs – a security breach, a critical system has issues,...
Can You Make Sense Of Your Security Logs?
The average IT Pro doesn’t need to be told stories about big data – you’ve been inundated with log data from dozens of sources for at...
How To Increase Revenues Using Just Cloud Backup
For those of you looking for ways to improve service, increase revenues and have a, generally, happier customer (oh, wait – that’s all of...