Industry Trends

A new category to include posts that do not fall under the other categories but are still crucial, like emerging technologies, research, and benchmarks relevant to the backup and disaster recovery industry.

Danger: This Android malware can unlock your phone and drain your bank account | Tom's Guide

Danger: This Android malware can unlock your phone and drain your bank account | Tom’s Guide

Hackers have created a new Android malware which can remotely wake up your smartphone, unlock the screen and then steal data as well as funds from your bank accounts in real-time. As reported by BleepingComputer, this new Android banking malware has been dubbed MMRat by security researchers at Trend Micro who first discovered it back […]

Danger: This Android malware can unlock your phone and drain your bank account | Tom’s Guide Read More »

Data From The Qakbot Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI

Data From The Qakbot Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI

Today, the US Justice Department announced a multinational operation involving actions in the United States, France, Germany, the Netherlands, and the United Kingdom to disrupt the botnet and malware known as Qakbot and take down its infrastructure. Beyond just taking down the backbone of the operation, the FBI began actively intercepting traffic from the botnet

Data From The Qakbot Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI Read More »

FBI, European agencies announce major takedown of hacker network that used Qakbot software - ABC7 Los Angeles

FBI, European agencies announce major takedown of hacker network that used Qakbot software – ABC7 Los Angeles

LOS ANGELES — The FBI and its European partners infiltrated and seized control of a major global malware network used for more than 15 years to commit a gamut of online crimes including crippling ransomware attacks, U.S. officials said Tuesday. They then remotely removed the malicious software agent – known as Qakbot – from thousands

FBI, European agencies announce major takedown of hacker network that used Qakbot software – ABC7 Los Angeles Read More »

Unleashing the Power of Data Archiving: Benefits for Companies and the Roadmap to Success

Introduction: In today’s data-driven world, businesses generate more data than ever. As this data accumulates, so does the need for efficient storage and management solutions. Data archiving, a practice that involves moving rarely accessed or inactive data to a long-term storage system, has become increasingly important for companies of all sizes. In this article, we’ll

Unleashing the Power of Data Archiving: Benefits for Companies and the Roadmap to Success Read More »

Backup scheduling best practises to ensure availability

Imagine a scale where the two endpoints represent two extreme data protection policies. The endpoint on the left-hand side of the scale is marked, “good backup of the system when it was configured and released into Production” (i.e. “day-zero backup”). The endpoint on the right-hand side of the scale is marked, “real-time mirroring/replication”. These two

Backup scheduling best practises to ensure availability Read More »

iSCSI vs. NFS – which one is better choice for Instant VM?

iSCSI vs. NFS – which one is better choice for Instant VM? Occasionally I come across a discussion about which approach is better to serve backup data to an Instant VM – iSCSI or NFS, or any others? Those who advocate NFS quite often say that if the target hypervisor supports NFS storage and the

iSCSI vs. NFS – which one is better choice for Instant VM? Read More »

Are your backups safe from Malware?

Recent reports from multiple sources reveal the weight of ransomware attacks has recently skewed towards MSP networks. Sources confirm in some cases the hacker’s penetration causes disabling backup and disaster recovery (BDR) systems. Depending on how MSP’s handle end-customer separation from MSP environment – the ransomware can either be propagated to the end-user fleet, or

Are your backups safe from Malware? Read More »

Combat Malware

ActiveImage Protector: adding anti-malware Controls

Recent reports from multiple sources reveal the weight of ransomware attacks has recently skewed towards MSP networks. Sources confirm in some cases the hacker’s penetration causes disabling backup and disaster recovery (BDR) systems. Depending on how MSP’s handle end-customer separation from MSP environment – the ransomware can either be propagated to the end-customer fleet or

ActiveImage Protector: adding anti-malware Controls Read More »

Optimize your business and partner with ActiveImage.

MSPs: 4 Ways to Optimize Your Business

It is already the third month of the year, and you are most likely still trying to implement the positive changes your business decided to embark upon in the beginning of the year. Are you where you thought you would be by now? Are you struggling to define these ‘New Year business resolutions’ or have

MSPs: 4 Ways to Optimize Your Business Read More »

Engaging and empowering non-technical clients improves customer relations and satisfaction.

MSPs: 4 Tips on Engaging with Non-Technical Clients

All MSPs at one point or another are likely to deal with clients who are not ‘tech-savvy’ or do not understand the different technical aspects of backup and disaster recovery management. In these cases, it is important to treat these clients a little differently to ensure their satisfaction and to maintain, if not better, the

MSPs: 4 Tips on Engaging with Non-Technical Clients Read More »

Scroll to Top