Nov 11, 2016
Advanced Screenshot Verification Explained
Backup is obviously an essential part of a business continuity strategy, but backups are useless if you can’t restore from them.
Nov 11, 2016
Andrew Burton
Backup is obviously an essential part of a business continuity strategy, but backups are useless if you can’t restore from them.
Alliance Brokerage Corp, an insurance agency out Long Island NY, was recently hit with a ransomware attack. Thankfully their IT solution provider, Total Technology Solutions, had a Datto in place. Total Tech was able to bring Alliance back within a matter of minutes.
The story of a pediatric dentist office kicking a ransomware attack (CryptoLocker) in the teeth.
When it comes to avoiding downtime, Databranch, Inc. is among the best of the best. The IT consulting/outsourcing provider and Datto partner has been operating out of western New York for over 30 years, delivering managed services, networking and security.
Portfolio Arts Group are a manufacturer of high-quality home decor products for various retail chains, located in Connecticut.
Arthur Kaye, owner and manager of Lighthouse Networks, has been providing IT services to small and mid-sized businesses for the past decade. All clients can expect 24/7 support of their systems to guarantee them as little downtime as possible.
Jan 22, 2016
Chris Brunau
We all know the frustration. You’ve made it more than clear to a customer how important it is to put the right business continuity solution in place.
This eBook features the 4 essential aspects of Business Continuity for IT professionals.
For an MSP to offer proper business continuity and disaster recovery (BCDR), selling just backup is no longer enough.
Sep 22, 2015
Chris Brunau
With the abundant amount of features available in the backup, disaster recovery, and business continuity market, it’s hard to believe tape is still being used as a backup option
Feb 09, 2015
John DeWolf
Hopefully you’ve never experienced the total frustration of dealing with a system infested with malware. It may take hours to detect and remove all of the malware-affected files on a system. Because of this, many IT people prefer a “clean install”, which erases the drive and replaces everything on it. But with a clean install, you’ll lose any information not saved elsewhere.