We Want to Hear from YOU! Does Your Backup Stack Up? [POLL]

Posted by Mary McCoy on May 27, 2015 9:53:34 AM

Are you getting the most out of your backup solution? Maybe you're not currently offering business continuity as a service, but recognize the offering as a new revenue stream and are open to shopping around. When it comes to the protection of your customers' data, you can never be too safe. You may not know all the BDR bells and whistles available to you. Did you know you can backup every 15 minutes without overtaxing servers? Perhaps you'd like the ability to move or copy data from one server to the other. Whatever you're looking for in your backup solution, we want to know! Keep reading to take part in our poll.

Read More

Topics: Backups, data protection, disaster recovery, block-level backup

This Week in Data (May 22, 2015)

Posted by Ben Barker on May 22, 2015 2:21:49 PM

 Satellite-this-week-in-data-may-22

"This Week in Data" is a weekly infographic that aims to serve as a quick and easy way for our readers to catch up on the latest news about the people and organizations that are shaking up the world of big data, cloud computing, and all things data storage.

This week the LogJam vulnerability is compromising connections between users and servers while vulnerabilities in UC Browser are allowing spy agencies to collect personal information. Additionally, a recent study shows that half of all retail and health care websites were vulnerable in 2014. 

Want to get the rest of the story? Check below for the headlines in our weekly infographic, and you can find the links for each story further down on the page.

Read More

Topics: TWID

Is the New Venom Virtualization Vulnerability Deadly to Data Centers?

Posted by Mary McCoy on May 21, 2015 6:00:00 AM

Last Wednesday, news broke about a new zero-day vulnerability that has the web hosting community hissing. Originally discovered by security firm CrowdStrike, VENOM - or Virtualized Environment Neglected Operations Manipulation - is a buffer bug that lives in the virtual floppy drive code of the open source QEMU platform that could potentially allow hackers to compromise entire data centers by gaining access to virtual instances on the hosts within.

Just how serious is this CVE-2015-3456 security concern? Which computer virtualization platforms have been affected and which have released patches? Almost a week after detecting this flaw, are we right to equate its impact with Heartbleed or should we shed that comparison like an old layer of skin? Learn more about the VENOM virtualization vulnerability, how hackers can exploit it to gain access to virtual machines and what web hosts can do to mitigate the damage!

Read More

Topics: data protection, hosting, data loss, Industry News, security

This Week in Data (May 15, 2015)

Posted by Ben Austin on May 15, 2015 6:30:00 AM

"This Week in Data" is a weekly infographic that aims to serve as a quick and easy way for our readers to catch up on the latest news about the people and organizations that are shaking up the world of big data, cloud computing, and all things data storage.

This week we saw two companies making big investments in H2O, there's yet another vulnerability out there that could have a Heartbleed-like impact on data centers around the globe, and Google reports that it has been ignoring more than half of the removal requests it has received in the last year.

Want to get the rest of the story? Check below for the headlines in our weekly infographic, and you can find the links for each story further down on the page.

Read More

Topics: TWID

The Benefits of Site-to-Site Data Replication for Customers and Web Hosts Alike

Posted by Mary McCoy on May 13, 2015 11:00:00 AM

Backup is in and of itself a contingency plan, and it can get confusing when we start throwing around terms like data replication. How is that any different than backup, which is literally copying data and storing it somewhere else?

If your clients are already backing up data locally, they may think they’re covered, and it’s up to you to convince them otherwise. At the same time, you can’t assume your own data center is invincible. Do you have a second layer of defense for the copied data you’re already storing should IT hit the fan?

Read More

Topics: Backups, data protection, data recovery, server backup

This Week in Data (May 8, 2015)

Posted by Ben Austin on May 8, 2015 10:40:45 AM

"This Week in Data" is a weekly infographic that aims to serve as a quick and easy way for our readers to catch up on the latest news about the people and organizations that are shaking up the world of big data, cloud computing, and all things data storage.

This week we saw the discovery of a new malware that goes above and beyond to keep itself hidden, more WordPress plugins that are leaving millions of websites vulnerable to attack, and a federal court ruled against the mass collection of telephone data by the NSA.

Looking for more? Check out the infographic below and then scroll down to get the links for each of the stories we covered.

Read More

Topics: TWID

How Domain Hijacking Works and What Web Hosts Can Do about It:

Posted by Mary McCoy on May 6, 2015 10:40:00 AM

As web hosting providers, your business is only successful if your customers' websites are live and generating new business for them. Still, there are threats which can lead to downtime that your customers can ill afford.

You're likely already aware of domain hijacking, a targeted attack that manipulates the communication between your customers' domain name and your web server, thereby taking their website offline and replacing with the hijacker's website. Your customers may not know about this risk, and you can't rely on the domain registration company they're working with to provide the resources needed to make them savvier website owners.

That's where you come in! 

Read More

Topics: hosted services, Webhosting, data protection

This Week in Data (May 1, 2015)

Posted by Ben Austin on May 1, 2015 10:25:00 AM

"This Week in Data" is a weekly infographic that aims to serve as a quick and easy way for our readers to catch up on the latest news about the people and organizations that are shaking up the world of big data, cloud computing, and all things data storage.

This week Google is trying to help users defend against phishing attacks, there's a newly discovered malware that is turning unsuspecting computers into spam bots, and Microsoft is flexing its machine learning muscle with a new website that guesses visitors' ages.

Are you at the edge of your chair yet? Scroll down the page to read all the headlines in the infographic below and then scroll just a little bit further to find links to each full story.

Read More

Topics: cloud, cloud computing, TWID, security

Site-to-Site: Disaster Recovery for your Backups

Posted by Ben M. Thomas on Apr 28, 2015 9:00:00 AM

We all know how effective R1Soft’s Server Backup Manager is at protecting your server infrastructure. We hear stories on a weekly basis about how having a reliable backup has saved someone from truly dire circumstances. But have you given much thought about the backup of your backups? 

Over the years, our users have tried numerous approaches to protecting their backup systems. Up until recently, many of those approaches could only be recommended as a solution to the worst possible scenario.

Read More

Topics: disaster recovery, multi-point replication, Product Release, Product Update, site-to-site

This Week in Data (April 24, 2015)

Posted by Ben Austin on Apr 24, 2015 6:30:00 AM

 

"This Week in Data" is a weekly infographic that aims to serve as a quick and easy way for our readers to catch up on the latest news about the people and organizations that are shaking up the world of big data, cloud computing, and all things data storage.

This week Google officially announced that it's "experimenting" in the mobile wireless industry, Microsoft is giving Office 365 customers the final say on their data security, and IBM makes a big move toward preventing cybercrimes.

Are you at the edge of your chair yet? Scroll down the page to read all the headlines in the infographic below and then scroll just a little bit further to find links to each full story.

Read More