Skip to main content

BLOG

The Colonial Pipeline ransomware attack was huge news for many reasons (not the least of which was the gasoline panic buying it caused in the Southeast). But one of the most notable for IT was the fact that the company paid a $4.4 million ransom in Bitcoin to recover its data. Wouldn’t an organization that […]

Read

It wasn’t that long ago that data protection fell under the responsibilities of an IT generalist. After all, there really was nothing particularly complicated about doing a nightly backup to tape and then shipping off a copy to Iron Mountain.  Now, however, it’s a whole new ballgame. Ransomware attacks, natural disasters and an increased reliance […]

Read

City and county governments are some of cybercriminals’ favorite targets for ransomware. Over the past few years, major cities like Atlanta, New Orleans and Baltimore have been left nearly dead in the water from an IT perspective after devastating attacks rifled through nearly all their data. Some, like Delaware County, chose to pay ransom, while […]

Read

Microsoft Office 365 is a critical SaaS application in remote and in-person workplaces. The data stored is often vital to running many businesses’ day-to-day operations. How does your company protect that valuable asset? OffsiteDataSync protects that data with a backup-as-a-service (BaaS) offering, powered by Veeam. However, do you need to backup Microsoft Office 365? Let’s […]

Read

As 2021 comes to a close, many of us will examine what did and didn’t work during the past year, and then vow to make changes that’ll help us improve as we move forward. While these resolutions can sometimes be difficult to keep, when it comes to data protection, Veeam and OffsiteDataSync are making it […]

Read

Veeam & OffsiteDataSync present “2022 Data Protection Trends & Resolutions” on Tuesday, December 7, 2021 at 2:00 P.M. ET.  Jason Buffington, VP of Solutions Strategy, Veeam Software and Jonah May, Sales Engineer and Veeam Vanguard, OffsiteDataSync present data protection YOY trends and 2022 data protection resolutions. New global data, sourced from your peers, referencing the […]

Read

All too often, data protection is a checkbox exercise. Have we got backups of our data? Check! Three copies of each? Check! Are they on two different media? Check! Is one offsite? Check! All done! Except you’re not all done.  The 3-2-1 rule — three copies of data on two different types of storage media […]

Read

The 3-2-1 rule serves as a guide for IT pros through the tricky policy development phase of effective business continuity. 

Read

Today’s digital landscape is giving rise to insider threats. According to a study done by Ponemon Institute, the global cost of insider threats rose by 31% from 2018 to 2021 ($8.76m to $11.45m).  These threats pose a significant risk to your organization’s cybersecurity, so it’s important to understand how to recognize and defend against them […]

Read

National Cybersecurity Awareness Month (NCSAM) is celebrating its 18th year with the theme “Do Your Part. #BeCyberSmart”. This theme was picked to help both individuals and organizations feel empowered in their role to protect their own cyberspace and data.  Throughout the month, the National Cybersecurity Alliance and the Cybersecurity and Infrastructure Security Agency will raise […]

Read

According to Nuspire’s 2021 Q2 Quarterly Threat Landscape Report, the second quarter saw a 55.240% increase in ransomware activity with the attacks becoming “more common and more damaging”. The report is sourced from 90 billion traffic logs to outline new cyber criminal activity, tactics, techniques, and procedures. Q2 contained one of the most notable ransomware […]

Read

Howard University shut down online and hybrid classes and turned off access to public WiFi after being targeted by a ransomware attack on Friday. The University is working with the FBI to understand the cause and effect of the attack.  This comes shortly after another attack that occurred last month in Texas. Judson Independent School […]

Read

What’s the right data protection path for your organization? Is it Backups or DRaaS? In our recent webinar “Protecting Data, Workloads, and your Operations: Backup is NOT DRaaS” we covered: What’s at Risk: Basing your choice on what’s really importantComparing Backup and DRaaS: From focus, to process, to outcomeMaking a Choice: Putting a plan in […]

Read

In the spring of this year, Mount Desert and Limestone, Maine were hit with ransomware attacks. Both were targeted by hackers hoping to access data from sewage treatment plants located in the communities.Limestone Water and Sewer District was hit on the fourth of July, causing computer shutdowns and alarm interruptions that are set in place […]

Read

Congratulations to our partner, Veeam Software for being positioned by Gartner, Inc. in the Leaders Quadrant of the 2021 Magic Quadrant for Enterprise Backup and Recovery Solutions!  This is the fifth time Gartner has recognized Veeam as a Quadrant Leader and the second time they have positioned Veeam as highest overall for their ability to […]

Read

In March, cybersecurity firm PC Matic gathered up findings from a survey of nearly 6,000 employees nationwide, focused on trends related to cybersecurity and people that had been working remotely since the start of the pandemic. It showed nearly 35% are still working from home. And as cybersecurity threats escalated through the year— ransomware attacks […]

Read

If you’re in IT at a small-to-mid-sized business (SMB), you know what it feels like to wear many hats, one of which will be backup and disaster recovery. It’s a rare SMB that has anyone in IT specifically dedicated to this function, much less a full data protection team. And given that the way people […]

Read

The year 2020 changed the way businesses operate for good, because even when it does become safe for employees to return to the office, many will continue working remotely at least part of the time. To support this, IT has accelerated the adoption of software as a service (SaaS) and moved critical, routine operations to […]

Read

Over the past year, COVID-19 has transformed the way businesses operate, and though workplaces are now reopening as the pandemic winds down, we don’t foresee a wholesale rush to return to the office. Remote work is here to stay. And it has serious implications for data protection. First, though, let’s get a clear picture of […]

Read

Data and applications no longer live exclusively inside the firewall. With so much of the workforce remote during the pandemic, organizations ramped up their transition to the cloud and software-as-a-service (SaaS). And for SMBs, SaaS has been a particularly important initiative. According to the IDG 2020 Cloud Computing Survey, IT management expects to “reduce their […]

Read

The Veeam 3-2-1 Data Protection Blueprint – Offsite Backup, Your Data, and The Cloud Watch the webinar “The Veeam 3-2-1 Data Protection Blueprint – Offsite Backup, Your Data, and The Cloud” Learn optimal ways to protect your data while reducing time, cost, and risk! Join industry experts Travis Evans (OffsiteDataSync Sales Engineer) and Brendan McCoy […]

Read

SharePoint. It’s a really flexible integration tool. You can use it to create websites. You can share and access information with others, no matter what device they may be using. You can use it to stitch applications together so that they interoperate, and a lot of people use it like OneDrive to store folders and […]

Read

Whatever business you’re in, your clients and customers depend on you, whether you supply them with ballpoint pens or provide legal services. When a customer places an order or calls you regarding a lawsuit, if you lose the documents you need to help them, you don’t just lose a business opportunity – you lose your […]

Read

When COVID-19 forced businesses to shift, almost overnight, to fully remote operations, the need to digitize operations and move to cloud storage became urgent. Half of organizations accelerated their digital transformation efforts, and 91% increased their usage of cloud services — 31% of them significantly — according to the Veeam 2021 Data Protection Report.  The […]

Read

When it comes to concerns about disaster recovery, IT pros go with what they know; they focus on the technology and usually can figure out how to restore a particular dataset, server or application. However, when there’s a disaster that destroys data and applications across the business, it’s a totally different story. Restoring everything for […]

Read

Last month, OffsiteDataSync’s Sales Engineer Travis Evans and Veeam’s Senior Global Technologist of Product Strategy, Anthony Spiteri conducted a webinar. These two data protection experts went into great detail about how the pandemic has transformed the world of work, and how backup and disaster recovery methods are changing along with it. These two know the […]

Read

Going to VeeamON 2021?  Register now to connect with OffsiteDataSync and thousands of IT professionals at this FREE virtual conference on May 25-26.  Attend VeeamON Virtual 2021 to hear: Future Trends in Backup and Disaster Recoveryv11 Best PracticesIndustry Expert Advice & Tips for Dealing with RansomwareMicrosoft Office 365 Backup Best PracticesAnd more!  You can find […]

Read

As we highlighted in an earlier blog, more than one hundred thousand global organizations running Exchange email servers have been hacked due to backdoors that allowed hackers complete remote control of their servers and access to their emails. Security experts are now tasked with assisting victims before the hackers revisit their servers and plant additional hacking […]

Read

Ransom paid has practically tripled in one year, with the average ransom paid by victim organizations across the US, Canada, and Europe going from $115,123 in 2019 to $312,493 in 2020. That’s a 171% year-over-year increase according to Palo Alto Network’s Unit 42s 2021 Ransomware Threat Report. Key findings in Unit 42’s report reveal greed and […]

Read

Over 100,000 organizations around the globe have been hacked via Microsoft email servers. A “web shell” backdoor gave the hackers total remote control allowing them to read all email, and infiltrate other machines. Industry engineers are rushing to identify, and alert victims to prevent from further destructions. The largest problem – many still do not […]

Read

EASY TO TRY, EASY TO BUY

LEARN

DOCUMENTS & VIDEOS

Access our library of free collateral, how to videos, and case studies

SEE RESOURCES

TRY

FREE TRIAL

Get hands on with our award winning Backup and Recovery solution

BEGIN TRIAL

BUY

GET PRICING

Use our pricing calculator to determine the right solution for your needs

CALCULATE