Network Recovery-as-a-Service: Five factors (besides disasters) that can cause a network failure

Network recovery used to be straight forward. However, with the advent of complex arrangements such as hybrid cloud computing, security, virtual servers, and the massive pressure cloud migration and mobility put on networks,  recovering from a network crash has become a complicated endeavor. It is also worth noting that networks fail for more reasons than … Read more

Case Study: Wood & Associates satisfied with Stage2Data’s full recovery and managed backup services

After more than 30 years in business, Wood & Associates have integrated the best of traditional, new, and emerging media to give clients’ marketing the best of ALL worlds, by using tried and true direct mail techniques that work. Adding a web component allows for accurate real-time data capture and mobile elements that improve access … Read more

Ransomware attack on multi-million dollar Ontario construction firm – make sure you are protected

“A multi-million dollar Ontario construction firm that has worked on major federal and provincial projects including facilities for national defence and police stations has been hit by a ransomware attack.” Serious questions arose when a Canadian construction firm working on both military and federal contracts worth millions of dollars was hit by a ransomware attack. … Read more

The Enterprise’s Guide to IT-as-a-Service

Before discussing IT-as-a-service you first have to understand enterprise IT. In a nutshell, enterprise IT is the secure consumption of services from two or more sources such as private cloud, public cloud and traditional IT. Its goal is to enable the integration of applications, data and services, to compose, orchestrate and manage workloads and to … Read more

Disaster Recovery-as-a-Service (DRaaS) for the SME/SMB market – The time is now!

Being cut off from crucial data for a lengthy period of time is every business’s worst nightmare. Something as malicious as ransomware, uncontrollable like severe weather, or innocent such as human error (or ignorant) can trigger a crisis like this. Notwithstanding the reason, the results will still be devastating. Here’s what you need to know: … Read more

SaaS vs PaaS vs IaaS: Which one should I choose?

The cloud is a hot topic for SMEs/SMBs yet it remains a very broad concept that covers a lot of online territory.  When considering switching your business to the cloud it becomes very important to understand the difference between the advantages and disadvantages of the different cloud services. There are usually three models of cloud … Read more

Don’t get caught! Here are 5 tips to protect your business against phishing

Phishing scams are geared towards infiltrating your system in order to gain access to usernames, passwords and sensitive information such as credit card details. These scams are, unfortunately, also very common and often appear real. There are, however, steps that you can take to protect your business against phishing attacks: 1. Prevent phishing emails from … Read more

Hybrid Cloud Security: 5 Questions to Ask

Even though cloud computing has only been available publicly for about a decade, the rate at which businesses are moving to the cloud is increasing rapidly. When the decision is taken to move to the cloud, specifically the hybrid cloud model, it is important to compile a cloud strategy first. This should include both infrastructure … Read more

Multi-cloud storage: 5 pitfalls to avoid

With ever-increasing data, the need for sophisticated data analytics and the ubiquitous requirement of maximum system performance, it is understandable that organizations would elect to move to a multi-cloud environment. In this article we focus on 5 pitfalls to avoid when deciding on your multi-cloud storage: 1. Beware of the cloud broker2. Vendor lock-in 3. … Read more

Why Organizations Fall Victim To Phishing Attack – Five Tips to Ensure You Don’t Take the Bait

Phishing attacks are one of the most prevalent and common security challenges for both individuals and organizations attempting to ensure the security of their information. Whether it’s obtaining credit card information, or gaining access to passwords and other sensitive information, email, social media and telephone calls are just some of the communication forms hackers use … Read more