The pitfalls of business continuity planning

If your managed IT services provider has been using the same business continuity plan (BCP) for years, your organization may be in trouble. BCPs should continuously be updated so you avoid overlooking or underestimating certain issues. Not updating your BCP is just one mistake that can harm your business. Here are a few more you […]

Don’t believe these disaster recovery myths

Modern technology changes rapidly, but not all businesses can match its pace. When it comes to disaster recovery (DR), we see business owners clinging to ideas that no longer apply. It’s high time you learn the truth about the following DR myths, so you can stop believing them. Myth 1: Tape backups are the best […]

Disaster recovery during hurricane season

There’s no telling when natural disasters will occur. When they do, certain regions in the country often bear the brunt of their impact, like when Hurricanes Harvey and Irma hit certain states in 2017. With a well-designed disaster recovery (DR) plan, your business can be spared from total devastation. Determine recovery hierarchy Certain parts of […]

Why you should back up your mobile devices

Almost every modern mobile device allows you to send and receive emails, download and upload media files, store data, and even close business deals. As mobile devices have become indispensable in everyone’s personal and professional life, the security risks have also increased — and backing them up has become more critical than ever. Malware on […]

Forget these disaster recovery myths

Disaster recovery (DR) isn’t what it used to be. Long gone are the days when a DR solution cost over a hundred thousand dollars and relied predominantly on tape backups. Cloud computing has dramatically changed the DR landscape. Unfortunately, there are still many misconceptions about DR. Here are a few of the myths that no […]

5 ways to become a smaller target for ransomware hackers

Hacking for ransom is on the rise — on pace to beat out last year’s figures — and hits people where it hurts, locking them out of files, photos and critical records until they pay hackers a bounty to restore their access. Hackers bait users to click on infected email links or open infected attachments, or they take advantage of outdated and vulnerable systems.