<img height="1" width="1" style="display:none;" alt="LinkedIn" src="https://dc.ads.linkedin.com/collect/?pid=239833&amp;fmt=gif">

Recent Posts

Cloud-to-Cloud Backup - Safer, smarter and more secure

Posted by Griffin Ball on Apr 27, 2018 9:27:00 AM

Small businesses are at the front lines in an almost constant attack of hackers.

These companies cannot afford downtime.

As we move into the information era, data becomes a foundational element of business. Data is collected, stored, and analyzed allowing businesses to gain a new depth of insight into their customers and their habits with an endless amount of possibilities to grow their business in a smarter, more agile way. This data needs to be available around the clock to ensure the operational success of the business. Data that once lived in basements and backrooms is being moved to cloud-based servers and SaaS applications. Historically, data backup has always been a key component of any IT strategy – whether it was stored on floppy disks, duplicate servers, or in custom built applications. With this shift to the cloud, backup shouldn’t be taken out of the strategy; rather, it should be re-thought to be more adaptable and cost-effective – the same reason you moved to the cloud in the first place.

Read More

Topics: Harmony, IT services, Business Continuity, Managed Service Provider

The Ultimate Disaster Recovery Checklist

Posted by Griffin Ball on Mar 30, 2018 9:14:00 AM

Stay One Step Ahead of Potential Disasters

Prepare yourself before disaster strikes. When it comes to data backup and disaster recovery (BDR), being prepared for potential disasters is key to keep your business running. It is not only important to have a disaster recovery solution you trust, but to make sure you test it as well. Keep this ultimate disaster recovery checklist on hand.

Read More

Topics: Harmony, IT services, Business Continuity, Network Risk Assessment, Managed Service Provider

Ransomware and How to Protect Your Organization...

Posted by Griffin Ball on Feb 9, 2018 9:03:00 AM

Businesses of every size are constantly threated by the brutal force of cyberattacks.

Ever since the first days of the world wide web, a form of blackmail called Ransomware has plagued businesses and individuals alike. So how does this work, why do people do it and how to protect your organization?

Ransomware is a type of malicious software that threatens to publish data and/or block your access to the files until a payment is made. Usually you have a deadline of only a few days to pay the hacker and sometimes you get two deadlines for different reasons. (You can see this man's own struggle meeting this here in a paper he wrote about the experience of being a victim to one of these attacks. He explains his frustrations, his advice, and his loss. Written late-2016.)

Read More

Topics: Harmony, IT services, Business Continuity, Managed Service Provider

What is Phishing and how can you protect yourselves against it?

Posted by Griffin Ball on Feb 2, 2018 9:22:00 AM

Have you ever gotten a suspicious email from someone you do not know asking for passwords or other sensitive data? Well that was probably a phishing attempt. Emails, social media, phone calls, SMS (texts), even snail mail can be mediums for this form of attack. It basically affects everyone nowadays, but the main target of these attackers has become small businesses. This is because they often have a weak network and high payoff for breaching their system.

As of the end of March 2016, 93% of all phishing emails contained ransomware, according to the report Malware Report – Q1 by PhishMe. This is a jump in 29% from February of the same year.

Read More

Topics: Harmony, IT services, Business Continuity, Network Risk Assessment