Blog Archives

Do You Need to Backup Office 365?

Office 365 lives in Microsoft’s Azure cloud service. That service consists of more than one location and certainly more than one server. Microsoft does an excellent job of keeping the service available, and to most users, it feels like it

Tagged with: , , , , , , , , , , ,
Posted in Blog

ChalkTalk Video: Ransomware Attacks Backups

Is 3-2-1 for Backup Enough to Protect Against Ransomware? Because many organizations continue to pay ransoms to unlock their data, ransomware continues to become more sophisticated. The malware now attacks backup applications themselves and is infiltrating backup data. In this

Tagged with: , , , , , , , , ,
Posted in Video

How to Protect Applications Running in Google Cloud – HYCU Software Briefing Note

When they are migrating or creating cloud-native applications, organizations need to consider how best to protect those applications. Most cloud providers provide very good high availability but don’t provide robust point-in-time recovery capabilities. Recovery from data corruption, user error and

Tagged with: , , , , , , , ,
Posted in Briefing Note

SlideShare: How to Design a Compliant and GDPR Ready Collaboration System

Users need to collaborate on projects, which means sharing file data with other internal users as well as external business partners. More often than not, to accomplish this file sharing, they leverage cloud-based file-sync and share solutions. The problem is

Tagged with: , , , , , , , ,
Posted in Slideshare

Securing Backups from Ransomware

Ransomware “developers” know that organizations are likely to count on their backups as a primary point of recovery if they are infected. As a result, these malware programs attempt to encrypt or disrupt backup operations. Other cyber attacks may even

Tagged with: , , , , , , , , , ,
Posted in Blog

Refining Your GDPR Strategy – Addressing User Data

The European Union’s General Data Protection Regulation (GDPR) deadline for implementation has come and gone. Many organizations have achieved a basic level of compliance, so now is the time to dig deeper, tie up loose ends and try to simplify

Tagged with: , , , , , , , , , , ,
Posted in Blog

Webinar: How to Design a Compliant and GDPR Ready Collaboration System

Users need to collaborate on projects, which means sharing file data with other internal users as well as external business partners. More often than not, to accomplish this file sharing, they leverage cloud-based file-sync and share solutions. The problem is

Tagged with: , , , , , , , ,
Posted in Webinar

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,893 other followers

Blog Stats
  • 1,255,938 views