Virtual Tape Library: Key to Business Continuity (Pt. 1)
Virtualization continues to grow in popularity as it offers different ways of backing up our data, in addition to being able to ensure that business-critical systems remain online in the event of an...
Rise of GDPR - Will On-Site Data Erasure be a Must?
The General Data Protection Regulation (GDPR) has officially gone into effect and many companies are now adopting their data protection and business continuity plans to these new rules in order to...
SSD vs HDD: Which Tech Lasts Longer?
Many comparisons can be made between a Solid State Drive and a Hard Disk Drive (SSD vs HDD): cost, speed, data storage capacity. However, in this post, we’ll be looking specifically at the durability...
Common IT Challenges - Shadow IT and More
IT always has its fair share of challenges, but are some of them preventable? Recently updated information shows that technological progress and cost or resource restraints are putting businesses at...
Migrating data? Here's What You Need to Watch Out For
Everybody loves a hardware upgrade, be it a smartphone, a tablet, a laptop or even a new server. It’s something shiny and new. When we talk about upgrades or migrating data though, it’s often more of...
First Ransomware Attack Targeting Mac OS X
There has been a long-standing rumor that Macs are immune to viruses and now, someone has proven Macs can be infected. The word is out in CNET’s article: “Apple users beware: First live ransomware...
Dangerous Adware - What to do if Infected
The term adware originated from the contraction of the terms advertisement (advertising) and software. Adware falls under the heading of malware and is primarily not dangerous, but very inconvenient...