Data Safe Blog | Data Safe LLC | Rockaway Township

August 22, 2019

With the start of hurricane season, we wanted to provide you with a simple checklist as a reminder of basic steps to take to ensure you are ready to support your customers throughout the event.  

So here it is - Disaster Recovery Checklist: 

1. Check recent bac...

The network is down, which means your POS system isn’t taking cards, your half-completed inventory order will have to wait, and scheduling the window cleaner will be added to tomorrow’s to-do list. Small and mid-sized business owners keep a lot of plates spinning with...

As your Managed Service Provider, our top priority is effectively managing your network and technology assets to keep them safe and optimized so you stay productive.

To do this, we leverage Datto Remote Monitoring and Management (RMM) to manage and protect your business...

Let's Get Technical

An intrusion is any activity that is designed to compromise your data security. This can be through more menacing and pervasive formats like ransomware or unintentional data breaches by employees or others connected to your network. An intrusion may...

July 9, 2019

Let's Start Here: What’s an MSP?

An MSP, or managed service provider, is an IT service professional to which SMBs outsource their IT needs.

MSPs are the guardians of IT, delivering ongoing monitoring and management of client applications (email, web site, security, etc.)...

June 27, 2019

It appears hackers are becoming more zealous and going for bigger game. According to a new report from Reuters, hackers from China have targeted eight major computer firms and MSPs throughout a year-long attack. 

The "Cloud Hopper" attacks have hit some major compa...

June 21, 2019

The cost of a few hours of downtime, never mind days or weeks, can be devastating for a business. When a business is down, customers cannot make purchases or access account information. Employees can’t work. The lost revenue adds up quickly.

There was a time when taking...

You’d be in the minority if you haven’t seen a headline — or been personally affected by — one of the thousands of data breaches that have occurred over the last decade. To name a few:

  • In 2013, Yahoo was breached, exposing more than three billion accounts on it...

Regardless of what type of restore you are running, it’s imperative to ensure that it works, no matter what. Some vendors do a checksum check while others do boot-ability checks. However, nothing compares to a manual check. In this blog, we’ll focus on how to successfu...

April 16, 2019

There's a common misconception that user data in SaaS applications is fully backed up. It’s more likely that an employee will delete something they end up needing two weeks later than the possibility of all of Google’s servers being destroyed by a storm. In fact, SaaS...

Please reload

Featured Posts

July 25, 2019

Please reload

Recent Posts
Archive
Please reload

Search By Tags
Follow Us
  • Facebook Basic Square

© 2017 by Data Safe Group | All Rights Reserved | Articles