Ransomware is one of the most dangerous and disruptive types of cyber threats we face today. Not only is it disruptive and costly for businesses, but it also causes massive disruption to the backbone of society. Here’s what happens and how to prevent ransomware in Microsoft 365 cloud.
Amazon S3, MS Azure and Google Cloud Storage Pricing Comparison
When it comes to choosing professional cloud storage, pricing may become the deciding point. To help you better navigate the ever-changing cloud storage market, we prepared a short article comparing prices for three of the most popular solutions: Microsoft Azure, Google Storage, and Amazon S3 cloud storage services.
Amazon EC2 vs Amazon S3: Difference and Use Cases
In this article we make a comparison of Amazon EC2 vs Amazon S3. Amazon Web Services allows its users to build complex interconnected applications in the cloud. To do that, you can use the virtual machines of Amazon EC2 or the expandable storage of Amazon S3. This article explains in detail what each of the given services does, the difference between them, how you can use Amazon EC2 and Amazon S3 together, and what additional AWS services (such as EFS and EBS) you might wish to use combined with EC2 and S3.
Continue reading
How to Back Up Amazon EC2 Instances
Amazon EC2 is one of the world’s most popular cloud virtual machine environments. Naturally, there are several ways to perform the backup of your instances running on this server. The ways depend on the way you want to perform a backup, on the flexibility of the recovery operations available for you, and on the number and type of data you will transfer. This article overviews the different methods for backing up EC2 instances and discusses the pros and cons of each Amazon cloud backup approach.
RTO vs RPO
Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are the two key parameters that businesses should develop before creating their business continuity and disaster recovery plans. In this guide, we compare RTO vs RPO and explain their meaning, differences, and interactions.
Continue reading
Introduction to BitLocker for MSPs
It's no secret that data security is vitally important for every organization: by protecting customers’ data, MSPs will safeguard both their client’s businesses and their reputations.
The protection of customer data today goes beyond using anti-malware and firewall software. It also goes beyond using a secure password on every device. Continue reading
Cold Calling: Are You Doing It Right?
Not everybody’s comfortable with cold calling prospects, but those who are can generate additional revenue for your business — as long as they’re cold calling the right way.
Cold calling isn’t dead; it’s just evolving. Continue reading
Fibre Channel vs. iSCSI vs. FCoE
A SAN (Storage Area Network) is one of the key infrastructural technologies in data storage and there are varying implementations and standards common for different business use-cases. In this article, we review the key differences between FC, FCoE and iSCSI in order to help you choose the best option.
Continue reading
Amazon S3 vs EBS vs EFS. The Difference Explained
It’s easy to get confused with the different types of storage with Amazon Web Services. This is why, in this article, we cover Amazon S3, Amazon EFS, and Amazon EBS storage options, and define the practical difference between them.
Continue reading
4 Reasons Not to Use Linux as an MSP
In certain cases, Linux offers great advantages to MSPs who need an operating system to run on their own systems, or to provision servers and workstations for their clients. Most Linux distributions are free of cost. There is also a variety of free applications available to run on them. You don’t need to worry about managing licenses. Linux, in general, is not susceptible to most of the malware that can affect Windows. Continue reading
3-2-1 Backup: What It Means and How to Achieve It
What does 3-2-1 backup mean, and what is the best way to achieve it? Keep reading for a 3-2-1 backup rule overview and best practices for implementing 3-2-1 backup in an easy and cost-effective way.
Pre-Signed URLs Use-Cases
Amazon S3 buckets protection is a critical security measure when using AWS. There have been numerous bad stories about unprotected S3 buckets, from established contractors like Accenture and Booz Allen Hamilton to huge companies like Verizon Wireless and Time Warner Cable. In this article, you will learn how to enhance the security of S3 buckets with pre-signed S3 URLs, and how to generate them for various cases.
Continue reading