The Definitive Ransomware Protection Guide for Business in 2020
Prepare - Survive - Recover
BackupAssist ER now gives you the option of Recover Anywhere, meaning you can achieve Disaster Recovery on Demand. Recover locally, in the cloud, or anywhere in between. When compared to DRaaS, it can achieve similar business outcomes at 75% less cost.
An abandoned office will present some unique risks to your I.T. infrastructure, your backups included. Here are some ways you can prepare for an office lockdown, so you remain cyber-resilient while the office is empty.
The best time to protect yourself from ransomware is before it strikes. Cyber-resilience requires the right ransomware protection to save you from the panic and stress of unplanned downtime and potentially hundreds of thousands of dollars in ransom payments.
An abandoned office will present some unique risks to your I.T. infrastructure, your backups included. Here are some ways you can prepare for an office lockdown, so you remain cyber-resilient while the office is empty.
The best time to protect yourself from ransomware is before it strikes. Cyber-resilience requires the right ransomware protection to save you from the panic and stress of unplanned downtime and potentially hundreds of thousands of dollars in ransom payments.
Guides

BackupAssist Reseller portal enhancements

As a BackupAssist reseller, you gain access to an online portal so you can place new orders, manage your customers licensing requirements and manage your account. With our ongoing commitment to our global channel partner program, we have recently released some new features that will help resellers manage their customers’ requirements. This article looks at these

Guides

Encryption Part 2 – BackupAssist encryption

Our previous article explained the importance of using encryption to protect your backups from unauthorized access. Now let’s look at how you can encrypt your backups using BackupAssist.

Guides

Encryption Part 1 – Backup encryption

We often think of data protection as just backups, but encryption is also an important data protection consideration. This article looks at drive encryption, and how it is used to protect your data from unauthorized access.  

Guides

Exchange Server protection

A company or organization’s emails are not just a record of what car left its headlights on or whose birthday it is. Emails also contain a critical record of decisions, agreements, conversations and data. Protecting this information carries both legal and commercial obligations, and requires careful planning.

Guides

Creating consistent backups with VSS

If you create and administer backups, you will have heard the term VSS. You may even know that VSS runs in the background while a backup takes place. Knowing that is usually enough but if you’re customizing your backups or encountering VSS problems it helps to know more.

Guides

SMB 3.0 Part 2 – Remote VSS backups

Our previous article looked at what SMB 3.0 is  in Windows Server 2012, and how it works. This article looks at the requirements for VSS with SMB 3.0, how to enable VSS support on a SMB 3.0 file share and how you can back up a remote VSS file share using BackupAssist.

Guides

SMB 3.0 Part 1 – A new way to store data

Wouldn’t it be great if you could use something as simple as a Windows file server to store and share something as complex as a server application like Hyper-V and SQL? Microsoft asked itself the same thing and made this possible with the release SMB 3.0 in Windows Server 2012 and Window 8.

Guides

Image backup destination selection

BackupAssist’s suite of backup types includes System Protection, our recommended backup type for Windows servers. This article looks at the requirements and advantages of different backup destinations for System Protection backups.

Guides

Planning for a Recovery

Data recovery is the process of taking a computer that cannot start itself and returning it to a previous operating state. This means a recovery has to start the computer and then recover its operating system, data and applications.

Guides

FAST incremental backups for System Protection

System Protection is a flexible backup technology that can be used to protect data and applications. As we mentioned in our previous article about Backup methods, System Protection creates an image that can be backed up incrementally.

Guides

Rsync made easy with Amazon S3

It’s easy to see why so many people are using remote backups. You have scalable storage, no hardware to manage and a backup destination that you can access from anywhere with an internet connection. This is ideal for roaming users, home offices, remote sites and small businesses. Note: BackupAssist 10 has introduced a fully-featured Cloud Backup solution.

Guides

Understanding Backup Methods

 When planning a backup, the amount of time the backup job takes and the amount of storage used are key considerations. By backing up only the data that has changed, you can reduce both the time and storage space—but you must still be able to restore any data required, using those backups. This can be