Blog

June 26, 2019

What Is Failover?

Tobias Geisler Mesevage

Discover what failover is and how it works. Weigh the potential benefits and drawbacks of deploying failover systems.

Read Now
June 20, 2019

What Is a Configuration Vulnerability?

Tobias Geisler Mesevage

Understand what a security configuration vulnerability is and how to avoid vulnerabilities to prevent cyber threats.

Read Now
June 18, 2019

What Is 2FA?

Tobias Geisler Mesevage

Two-factor authentication is a security procedure where a user is required to provide two different authentication factors to verify their identity.

Read Now
May 30, 2019

What Is Wi-Fi and How Does It Work?

Tobias Geisler Mesevage

Do you know how Wi-Fi works? Read this blog to find how data appears on your devices, seemingly out of thin air.

Read Now
May 14, 2019

Developing an Effective Regime to Back up Your SQL Server

Tobias Geisler Mesevage

Protect one of your organization’s most important assets by following some of these SQL Server backup best practices.

Read Now
May 07, 2019

What Is Data Risk Management?

Tobias Geisler Mesevage

A holistic data risk management system minimizes the ability of data that can be exposed or breached, and also promotes productivity in the workplace.

Read Now
May 02, 2019

Should You Build Your Own NAS or Buy One?

Tobias Geisler Mesevage

A network-attached storage (NAS) unit is a purpose-built computer with multiple hard drives, attached to a network, to store and serve data.

Read Now
April 26, 2019

Why Datto is for Small MSPs Too

Nick Wolf

Are you thinking about partnering with a business continuity and disaster recovery (BCDR) vendor but think they are all too big for you?

Read Now
April 24, 2019

Finding a Reliable Linux Backup

Tobias Geisler Mesevage

Finding a singular, comprehensive solution for a Linux backup is difficult, but we’ve found the answer.

Read Now