Latest posts

Change layout

8 Dos and Don’ts for Creating a Robust Cybersecurity Training Program

8 Dos and Don’ts for Creating a Robust Cybersecurity Training Program

Effective cybersecurity involves a combination of robust automated processes and alert, well-trained employees. This means that you have to deliver cybersecurity training which equips employees to do their job safely, but doesn’t overload them. With that in mind, here are eight dos and don’ts for creating a cybersecurity training program. Continue reading

Managed Backup Service

Microsoft 365 and Google G Suite Backup Configuration in MSP360 Managed Backup

Microsoft 365 and Google G Suite Backup Configuration in MSP360 Managed Backup

In MSP360 Managed Backup, you can perform backup and recovery of different services of Microsoft 365 and Google G Suite. In this video, we will review the backup of these two solutions. 

Initial Configuration

Since the user interface, settings and backup capabilities are the same for Microsoft 365 and Google G Suite, we will use the first one as a reference in this video. Continue reading

Backup Types Comparison

Backup Types Comparison

Backup Types Comparison

Are you confused with the different ways to back up your data? Full, differential, incremental, synthetic full - it’s easy to get lost in the terminology. In this article, we cover shortly all backup types without being too specific. If you already know about all backup types and simply want to pick the needed one for your use -case - scroll down, there is a chart that will help you choose from different types of backup. Continue reading