Posts

Is RAID A Backup Strategy?

RAID and backups are two very distinct technologies. One should not be used as a substitute for the other. In fact, you need both. Read on to find out why.

Why Businesses Pay The Ransom

The reason many businesses are forced to pay the ransom is poor planning. Don't be one of them. Know the different types of backups and which one you need to use to save your data and possibly your company.
Backup and Restore Decisions

Which Is Better: Full, Incremental, or Differential Backups?

Selecting a Business Continuity Disaster Recovery (BCDR) solution for your company is serious business. Select the wrong technology, and you could be out of business after the next disaster. Read this article and find out what you must know about backup technologies BEFORE you make your selection.

COVID-19 Exposes Flaw In DR Plans

Another COVID-19 business lesson that we all learned the hard way is that home networks must be part of your company’s Disaster Recovery Plan. Read on and find out what you need to do now.
Computer that reads "backup"

Backup or business continuity? What businesses need in 2019

Data backups are only one part of a proper business continuity plan. Having that plan in place means being ready for anything - we’ll show you how to prep.
Blue Digital shield with graphics

Continuity for Business Manufacturers

As a manufacturer, your data is crucial to producing your products. Avoiding data loss or theft is necessary to keep your company away from costly interruptions
Graphic of a hurricane next to an emergency checklist

Hurricane preparedness checklist for SMBs

While no one can prevent hurricanes or other natural disasters, the good news is that every SMB can prepare to survive if disaster strikes. According to data collected by the National Hurricane Survival Institute, around 40% of SMBs can't reopen after hurricane damage. Why?
Wooden blocks that spell out "Basics"

5 cybersecurity basics every one of your employees should know

90% of small businesses don't protect their data at all. Is your business at risk? Luckily, there’s some good news. You don't have to spend a lot of money to protect your business and clients. Follow these five basic cybersecurity tips to keep your company’s data safe.
Businessman stacking blocks that spell "BYOD" on table

How to develop a balanced BYOD policy

It’s increasingly common for employees to have their own devices – laptops, tablets, phones – at work; devices that they’re comfortable and familiar with. But BYOD policies can create some potentially dangerous situations for employers. These factors are a few to consider as you set up your BYOD policy.
Electrician

Case study: Swift Electrical Supply

Swift’s infrastructure had grown and evolved over the years into aging technology connected in piecemeal fashion. While they had an internal IT staff member who kept things running, the outdated system was prone to failures and downtime.