Dear Valued Customers, Our US office will be closed on Monday the 4th September 2017 for the Labor Day public holiday. Staff from our technical support and sales teams located in our US office will be unavailable on this day, including both phone and email. Australian support and sales teams will be operating as usual. If you’re
If you’re performing full image backups to NAS or RDX, you’ll want to seriously consider making a data container; especially for point in time restores.
Using numbers and symbols in your passwords to keep them secure? You’re doing it wrong. Chances are, all you’re doing is making it harder for you to remember – and super easy for a computer to guess. Here’s some password protection myths blown right open, and what you should actually do to make them secure.
Your hardware or OS fails, and your server won’t even start itself. Everyone’s complaining, and you’re under the pump. If only you could plug in an external drive, click your mouse a few times, and the whole thing was magically fixed. Well, that’s exactly what our Bootable Backups let you do. So long as you make
Researchers have successfully proven that viruses can be weaponized to infect computers and take them over. And if that’s not the premise of a dystopian sci-fi novel, I don’t know what is. The University of Washington recently baked malware into a genetic molecule and then infected a system analyzing it. If it sounds like DNA data
When you first open BackupAssist’s backup tab, you may be surprised by the number of different backup jobs you can perform. But which one do you choose? This article answers that very question. In it, we go through what each backup job does, and when you should use it. It’s a great refresher for software
IPM have broken a world record in data storage; and they’ve done it on tape. IBM fitted a whopping 330TB of uncompressed data on a palm-sized tape, smashing the record for magnetic tape storage density. It’s not quite DNA or Atomic storage, of course, but it’s pretty amazing given the storage media. That’s 201 gigabits
Even the best set-up server requires occasional maintenance. Here’s a ten point checklist on how to go about performing your own server upkeep and monitoring. Ticking these off can greatly minimize instances of server failure. 1. Check Your Room Arrangement The arrangement of your server room is vitally important. If you’ve inherited the job and had no say
Ransomware makers are cunning, exploitative, and deceptive. And that’s exactly why, if a ransomware message pops up on your screen, you should first take it with a grain of salt. One of the latest trends in 2017 is not to even infect your system with ransomware. Instead, cybercriminals will just tell you they’ve compromised your system, and
Found any kind of Windows flaw? Then you could be able to claim a big bounty from Microsoft, who announced all Windows flaws were now fair game. While the company has been running bug bounty programs since 2013, it has expanded it year after year to include bugs in Hyper-V, Microsoft Edge, and exploit mitigation