This Holiday Season Don’t Let The Backup Grinch Steal Your Time

Categories

As we approach the holiday season, no one wants to be recovering data when they should be spending precious time with family and friends. Unfortunately, IT departments are too often required to respond to emergencies during the holidays because of the 24/7 nature of modern business. Customers and prospects continue to interact with businesses online, even when the brick and mortar doors are closed.

This powerful, always on business strategy requires an equally powerful backup plan. Thankfully, while businesses and their IT departments no longer operate on a nine-to-five basis, neither does the support to help them through the holidays. Client interaction and client support happen more instantaneously than ever before, with 24/7 accessibility.

Is your business prepared for disaster this holiday season?

What Is Your Data Loss Plan?

Data loss can occur in several ways. A device can be lost or stolen. Hardware can fail or become corrupted. A simple click can introduce ransomware into networks and cause widespread, crippling infection. Malicious hackers love the winter holiday season – they know that in-house IT hours are reduced, and businesses have their guard down.

In seconds, tons of valuable data can be locked down or obliterated. All that is left is a business clambering to repair their relationships with clients and vendors, while spending large amounts of money and time trying to get things back up and running. A small error can create a calamity that requires all hands on deck, and that some businesses can never fully recover from.

You must ask yourself: if your company were caught in a similar scenario during the holidays, do you have a disaster recovery plan in place to quickly respond and get back to business? Would you be able to recover, or would your operations grind to a halt?

Disaster Recovery to the Rescue

It is possible to keep things running smoothly even when trouble arises. The DRaaS advantage lies in its ability to provide complete and rapid cloud recovery services. These services range from site and transactional restoration, to full data center recovery and failovers.

Because DRaaS is cloud-based, you won’t need to make a heavy upfront investment in a data center, servers, or software licenses to get your own remote backup and DRaaS solution. DRaaS additionally benefits enterprises by replacing huge capital expenditures with more manageable operational expenditures, making DR accessible to and affordable for any size organization.

For more information and insights, read our Disaster Recovery Guide now to learn what you need to be prepared.

Storagepipe Will Save Your Holiday Season!

Whether it’s a data breach, a power outage, a hard drive failure, or a storm or other disaster – restoring your service in the case of a disaster should be a paramount concern for any organization and requires a thorough Disaster Recovery Plan.

Data backup and security is important all-year round. If you’re lucky enough to be a Storagepipe client already, you can rest assured that your data is safe with our secure Backup and Disaster Recovery Services.

If you haven’t signed up yet, take advantage of our Christmas 2022 special and get up to 70% off on select services. Contact us for an expert assessment and pricing today, and rest easy during the holidays!

Stay Safe in the Cloud with Storagepipe

Questions? Ask Our Experts!

Data Protection, Backup & Recovery Trends Report 2022: Wrap Up the Year with Storagepipe

Categories

Hello friends,

We’re wrapping up the year with our annual Data Protection, Backup and Recovery Trends Report, where we share the most urgent, prevalent, and emerging challenges that we helped our customers solve with managed Cybersecurity , Backup as a Service and Disaster Recovery Services.

As we look back on 2022, we appreciate all the customers, partners, and supporters that joined us through a challenging winter, a fast-paced summer, and an autumn jam-packed with new opportunities.

Understanding this past year’s trends helps you to establish a benchmark as you consider your organization’s Data Protection opportunities and challenges and begin to plan for 2023.

Microsoft 365 Migration Shifted to M365 Data Protection

After a rapid adoption phase in 2020 – 2021 spurred by expected growth in digital transformation initiatives and the unexpected Covid-19 pandemic necessitating a massive shift to remote and hybrid work models, IT departments began reassessing their data protection needs in 2022.

In the rush to adopt, migrate, and deploy, data protection considerations can be overlooked. While many appreciate the collaboration made possible with Microsoft 365, some are unaware that the protection of data generated by these applications is their business’s responsibility. Microsoft does not perform backups on a company’s behalf, and they do not provide recovery services.

Microsoft’s Shared Responsibility Model states that they are responsible for ensuring that the platform remains accessible and available, while the customer is responsible for ensuring that their data is backed up and recoverable in the event of a disaster. If an adverse incident such as a security breach or ransomware attack strikes, Microsoft will not recover your data for you.

The risk of falling victim to ransomware is ever-present, with phishing emails and their mishandling by end users continuing as the #1 vulnerability vector. Malicious actors took advantage of the trust people have in Microsoft’s brand by embedding well-known file types such as Excel and Word with malicious links and code and adding them as email attachments from addresses that include ‘outlook’ in their domain. These tactics almost doubled in popularity between Q1 and Q2 2022.

Throughout 2022, Storagepipe has spread awareness of these dangers to your data and worked with businesses of all sizes to put effective managed anti-spam, backup, and disaster recovery plans in place.

Learn how organizations can achieve complete Microsoft 365 Data Protection in our helpful guide here.

All Businesses At Risk For Ransomware

In 2020, bad actors attacked big, enterprise targets – companies that had the deep pockets to pay out. As those businesses strengthened their cybersecurity posture and disaster recovery plans in response, they became more challenging to victimize. This spurred a shift in tactics from the private to the public sector, as large healthcare, infrastructure and energy, and government organizations became the new favoured prey throughout 2021.
After several headline newsworthy incidents, the public sector began taking notes from the private sector’s hard-won lessons and shored up their backup and recovery, as well as their cybersecurity monitoring, detection, and response capabilities.

As large entities in both private and public sectors came under attack, insurance companies bore the brunt of hefty ransomware payouts and criticism that their policies were rewarding bad behaviour. Fast-forward to 2022, and the terms – and costs – of cybersecurity insurance policy renewals have become eye-watering and for some SMBs, prohibitive.

Large businesses and government agencies may be able to absorb the increased expenditures and resources needed to meet the new compliance requirements. However, small and medium sized businesses can struggle to justify the spend when comparing risks, costs, and benefits. Especially with the added assumption that malicious actors only focus their attacks on enterprise sized organizations.

In 2022, that assumption proved to be disastrously wrong. For starters, data protection safeguards against more than just ransomware. It protects organizations from insider threats, accidental deletion or other user errors. It also protects against facility and hardware failures triggered by outdated equipment, misconfigured networks, connection downtimes, and natural disasters that wipe out entire regions.

While other threats have always existed, small and medium-sized businesses were often considered less profitable targets than the Fortune 500 set. And while malware incidents were common, expensive, and disabling, ransomware attacks before 2022 were less common for SMBs. This meant that their backup, recovery, and cybersecurity requirements weren’t as high as their larger peers’, and in turn less investments were made in keeping critical data and systems secure.

As 2022 progressed, that norm rapidly changed.

Ransomware has transformed into a business type of its own, with Ransomware-as-a-Service models, organized programmers providing regular patches and updates, and entire departments dedicated to extorting and processing payments that enable malicious actors to grow their attacks at scale. Some ransomware groups even have toll-free phone numbers that victims are told to call for more instructions, and chat support teams that have queues of victims waiting to pay.

Like all businesses, they need to produce a profit. Cyberattacks on enterprises have become time-intensive, with uncertain success. Even if malicious actors can breach the increased defenses made possible by improved firewalls, anti-spam tools, and virus blockers, their intrusions are increasingly discovered and rooted out by sophisticated cyberthreat detection and response before they can launch the full attack and lock down the victim’s systems. When the attackers can make their ransomware demand, they are increasingly being rebuffed thanks to their victims’ growing ability to fully recover their data and environments with managed backup and recovery services, and reluctant insurance companies balking at the claims.

From the attackers’ point of view, shifting their efforts to less protected, unsuspecting small and medium businesses makes good business sense. While the revenue per attack may be less, the number of attacks and success rate more than makes up the difference. As a result, many SMBs have been devastated in 2022 by downtime, data loss and egress, system corruption, compliance liabilities, steep insurance deductibles and premiums, and reputational damage. For some, these impacts have led to permanent business closure.

As we near the end of 2022, businesses and organizations of all sizes now require enterprise-grade data protection, disaster recovery, and cybersecurity to ensure their business continuity into 2023 and beyond. Thankfully, there are flexible and cost-efficient services available such as Warm Site Disaster Recovery.

Contact us to discover your options today!

Managed Detection and Response (MDR) Has Changed the Playing Field

As threat actors become more prevalent, organized, and multi-pronged in their attacks, businesses need a more coordinated strategy to guard their three main attack surfaces – endpoints, networks, and cloud/SaaS – 24/7. Realistically, most businesses lack the resources to ensure that level of coverage, or the expertise required to keep up with the rapidly evolving threat landscape.

With the necessity, came the invention. Managed Detection and Response Services simplify cybersecurity management with all-in-one 24/7 analyst-verified threat data and prioritized, actionable observations and recommendations to identify and counter cyberthreats before they take hold.

Now businesses of all sizes can block, discover, and disable attacks before they lock down systems and data, denying bad actors the chance to ransom organizations out of business and completely changing the threat landscape playing field.
What are your thoughts on our Trends Report? Let us know!

For forward-looking insights, check out what we’re expecting to trend in Cybersecurity services and Backup and Disaster Recovery services in 2023 as we help organizations plan and implement their cyber resilient Data Protection strategies.

Questions? Contact Us!

Data Protection Trends: Storagepipe Veeam Cloud Service Provider Partner Fireside Chat

Categories

Listen to our fireside chat interview with Anthony Spiteri, Senior Global Technologist at Veeam Software®, and Steven Rodin, CEO at Storagepipe as they discuss data protection trends impacting businesses, service providers, and platform vendors. Learn how Veeam Cloud Service Provider Storagepipe is rising above the challenges with a focus on customer-centric responsiveness and automation and providing innovative backup and disaster recovery service offerings tailored to customers’ specific requirements.

Get Anthony and Steven’s hard-earned insights around future-looking business risks and opportunities that are developing out of the disruptive shift from office-based workforces to flexible remote work-from-anywhere models, and what that means for IT professionals and the data workloads that they protect.

“THEY NEEDED A PARTNER THAT COULD TAKE ACTION QUICKLY, THAT COULD RESPOND TO THEIR NEEDS, COULD TURN AROUND COMPLEX SOLUTIONS RAPIDLY.”

– STEVEN RODIN, VEEAM CLOUD SERVICE PROVIDER STORAGEPIPE

Steven commented that with the almost overnight shift to remote work, everyone had to quickly adjust; the Storagepipe team and their customers alike. “There were more people wanting to make decisions more rapidly. Organizations needed to make important IT decisions even during the pandemic, and they needed a partner that could take action quickly, that could respond to their needs, and could turn around complex solutions rapidly. So that was what we were focusing on, not just that we had the right solution but that we were delivering it quickly and effectively, even from a team working remotely.”

“THE TIME IS JUST RIGHT FOR BUSINESSES TO MOVE INTO THEIR TRANSFORMATIONAL JOURNEY.”

– ANTHONY SPITERI, VEEAM SOFTWARE

When asked what the important trends he’s seen come out of the pandemic, Anthony shared, “I think when you think about where we’ve come from over the past 10 years, with the move from on-premises service, virtualization, modern data platforms, software as a service, infrastructure as a service, just general cloud adoption, it’s been almost this Goldilocks situation where the time is just right for businesses to move more into their transformational journey.” What was his second big data protection trend? Watch the video to find out!

Many businesses with on-premises workloads are migrating some systems to the cloud and often end up with hybrid cloud environments in need of unified protection. Discover how Veeam managed services are developed and supported by Storagepipe’s in-house technical team of certified Veeam Architects and Engineers, who work closely with Veeam as new and enhanced functionalities continue to be added to the data protection platform.

For example, over the past 18 months Storagepipe has seen several services boom in popularity as businesses and organizations accelerate their digital transition to cloud-based data protection. “We’ve seen some tremendous momentum behind our Office 365, Microsoft 365 backup solution. That’s been a really big driver, from one of Veeam’s key products,” shared Steven. “Customers at first were looking to do that themselves and looking to do that on-prem, but we saw more customers moving to outsource that, moving to a managed service especially when they were out of the office.”

“WE’VE TAKEN THE TIME DURING THE PANDEMIC TO INVEST IN OUR PUBLIC CLOUD SERVICES, AND THAT’S BEEN BOOMING.”

– STEVEN RODIN, VEEAM CLOUD SERVICE PROVIDER STORAGEPIPE

When discussing data protection trends, the conversation often naturally turns to how to safeguard workloads living in the public cloud, or in a hybrid cloud model. “We’ve taken the time during the pandemic to invest in our public cloud services, and that’s been booming,” Steven shares. “We’ve seen the Azure and the AWS backup solutions that we’ve launched as a managed cloud service during the pandemic, really grow in the last year since launching with Veeam’s Backup for Azure and Backup for AWS.”

Listen to the interview below for more details on the latest data archiving, cloud backup, and disaster recovery capabilities from Veeam and Storagepipe, and where Anthony and Steven see the data protection industry going next.

Storagepipe Managed Services for Veeam Software

Storagepipe offers Veeam Backup and Replication in an as-a-Service model — including hardware, software, and offsite storage — for complete data protection. Our experienced and dedicated team of data storage and recovery experts including certified Veeam Architects and Engineers provides proven solutions for your business.

Storagepipe Veeam managed services include:

Storagepipe is an Award-winning Veeam Platinum Cloud Service Provider

We’ve launched! Check out our new website and come meet your Cloud and Disaster Recovery Heroes

Categories

Storagepipe is excited to announce the launch of our new website, designed with our customers in mind. You spoke, and we listened! Visitors to our website now enjoy an expanded service portfolio, with new information around our Backup, Disaster Recovery, Cloud Infrastructure, Cybersecurity, and Managed IT Services. We’ve also expanded our solutions information to give your business all of the services in one place, based on your industry.

Check out our detailed Security as a Service (SECaaS) and Managed Firewall Plans in one easy at-a-glance matrix, and for the first time, see all of our services supporting Veeam, IBM iSeries, and Microsoft 365 on their own dedicated solutions pages.

The new site also provides faster page load times for desktop and mobile devices, more ways for you to contact us, webinar and event announcements, and a helpful Knowledge Center where you can access all of our Backup and DR insights that we publish, free!

Interested in partnering with us as a reseller? Our detailed Partners page is just for you. Easily expand your IT service portfolio with sticky and high-quality Backup and Recovery Services such as Veeam Cloud Connect, Veeam Backup and Replication, and Veeam appliances. And then add DRaaS cloud services like Warm Site Recovery or High Availability Recovery for Veeam, IBM iSeries and AS400, Windows, Linux, and Unix, VMware, Hyper-V, and Nutanix.

These updates are just the start. Our values center around providing world-class customer experiences, which requires us to get to know our customers’ needs. We want to provide you with responsive and useful information, so as visitors to our website please reach out and say hi to our Backup and Disaster Recovery Heroes. We will listen to your feedback and add to our services and the information on our website to better enable your decision-making processes.

About Storagepipe

Since 2001, Storagepipe has provided robust and secure Managed Cloud and Disaster Recovery solutions from a scalable multi-tenant infrastructure, supported by our first-class in-house technical team.

Storagepipe delivers highly flexible and responsive Cloud and Disaster Recovery services and solutions with outstanding skills and value, using state-of-the-art technology to offer ultimate protection and peace of mind.

We are driven to be your trusted partner and to ensure that we deliver a Storagepipe Experience that meets your business requirements with the reliability, scalability and support that your business demands.

What’s Missing in Your Microsoft O365 Security and Data Protection?

Categories

You’ve embraced remote working – are you still secure?

The trend towards remote working has been growing for several decades, but recently due to world events, many businesses have had to adopt supporting technologies and processes quickly and under pressure. The remote working trend has also dovetailed with the move to the cloud and software-as-a-service applications like Office 365. Cloud services are a great help in implementing remote working and in helping teams to collaborate even when not working in the same location. Cloud-enabled services and applications are often misunderstood, however, when it comes to security measures. Along with their SaaS services, businesses also need to consider using cloud-based security and disaster recovery services in parallel from a trusted DRaaS provider.

SaaS and Cloud providers like Microsoft, Salesforce, Google and others promise to secure the infrastructure that hosts the cloud application. But these SaaS providers are not responsible for covering all of the possible data and security issues that can arise, so customer support for backup, replication, and recovery services needs to be considered.

While the cloud provider takes care of the infrastructure, data and access remain the customer’s responsibility. The access risks compound as workers increasingly work remotely and communicate through email, which is the number one vector for malware.

Secure access to the cloud for remote workers today is usually ensured by either using an SDP or split-tunnel VPN. In either case, the security of remote access relies on user authentication. It is important not to make the mistake of relying on the employees to set up and manage their passwords. Individuals are notorious for setting easy-to-remember but also easy-to-guess passwords. Set up strict corporate password policies and enforce them. Also enforce regular intervals for employees to update their passwords.

Even with these stricter password policies in place, businesses would also be wise to employ multi-factor authentication (MFA). There are a number of ways for bad actors to manipulate or trick your employees into unintentionally revealing their passwords making it a good idea to have a second authentication method as a further roadblock. Traditionally, MFA was done using tokens, but it has become much simpler today to use the employee’s smartphone to send a code that they then enter into the SaaS login credential screen. There are a number of good choices for MFA available such as Google Authenticator, or options recommended by Microsoft. Need help determining which MFA solution is the best fit for you? Ask our Microsoft 365 experts today!

Even MFA access through SDP or a VPN will not always guarantee security for your most precious data; internal employees can also act maliciously. Therefore, it is a good idea to design your internal data access policies to ensure that each end user only has access to the applications and data that they need to do their jobs.

Segmenting your data collections is another good policy to adopt for additional Cybersecurity and data protection. Having all your eggs in one basket is never a good idea. Using various software-defined networking techniques such as SDPs or SD-WAN, you can literally define the connection between the user’s device and a specific server. They can be completely restricted to this network slice. Finally, think carefully about which workers get remote access; not everyone needs it all the time.

One main vector for security breaches is via email “spear phishing” attacks, which attempt to induce people to reveal personal information, such as passwords and credit card numbers by posing as reputable companies.

Phishing is a common technique for extracting passwords from employees with some IT professionals reporting 1000+ phishing attempts hitting their email inboxes a month. Other malicious email campaigns include sending attachments with embedded trojan code, or links pointing to compromised websites that auto-download malware onto users’ systems.

All employees are at risk of making a split-second poor decision and exposing their computer to these attacks. Threat actors are adept at choosing topics that people are eager to learn more about, often playing off trending fears and anxieties to lessen people’s natural caution and common sense. As a sign of the times, many organizations are reporting increased email phishing and Business Email Compromise (BEC) attacks since the beginning of the COVID-19 pandemic, with many messages claiming to offer breaking news or free tests. Once the pandemic has finally abated, threat actors will move on to the next anxiety-provoking topic.

While Microsoft and other email SaaS providers often try to help to filter unwanted senders’ messages by verifying the IP address to guard against phishing, oftentimes their off-the-shelf attempts lack comprehensive protections and may lag behind in updating against the latest threats. IT professionals should look to enhance their email security by looking for Managed Anti-Spam and Anti-Virus solutions that offer services for scanning both inbound and outbound emails to eliminate spam and known attacks, and Managed IT Services for analytical reporting, Cybersecurity and on-demand expertise from a trusted DRaaS provider.

While it is critical to stay on top of the latest security threats and trends, it is also the case that malicious actors are constantly innovating new attack strategies. Barely a week goes by that some new kind of threat is launched and discovered. From denial of service to trojan horses and ransomware, you can never rule out the possibility that your business will be the next headline victim and cautionary tale.

Storagepipe, Backup, Cloud Backup, Backup as a Service, Backup as a Service (BaaS), BaaS, Disaster Recovery, Disaster Recovery as a Service, Disaster Recovery as a Service (DRaaS), DRaaS, Backup and Recovery, Backup and Replication, Veeam Backup, Veeam Cloud Connect, Veeam Cloud Backup, Veeam Backup and Replication, Veeam Replication, High Availability, Hot Site, Backup Services, Data Recovery, Data Recovery Services, Cloud Backup Services, Cloud Backup Service Provider, M365 Backup, Microsoft 365 Backup, Microsoft 365 Cloud Backup, Managed Microsoft, Managed Microsoft 365, Managed Microsoft 365 Backup, Managed Microsoft 365 Cloud, Managed Microsoft 365 Cloud Backup, Microsoft 365 Protection, Managed Microsoft 365 Protection, Managed Anti-Spam, Managed Antispam, Managed Anti-Spam Services, Anti-Spam Services, Exchange Online, Exchange Online Anti-Spam, Email Anti-Spam, Microsoft 365 Email, Microsoft 365 Anti-Spam Email, Microsoft 365 sale, M365 sale, Microsoft 365 offer, M365 sale, Managed Microsoft 365 sale

How does a DRaaS Provider enhance Microsoft 365 data protection and cybersecurity?

That is one of the most important, but not the only, reason to have a comprehensive backup and rapid disaster recovery service. Another reason is that employees unintentionally delete data all the time. In fact, they are the most common source of data loss. Even IT professionals can make configuration mistakes that can open data to being hacked or even lost. So, a comprehensive backup and disaster recovery option is essential for restoring your data.

This is where cloud services expand their usefulness from a means to collaborate efficiently, to storing and protecting your critical and everyday business data. Disaster Recovery as a Service (DRaaS) has become increasingly important in an era of escalating natural disasters, cyber-attacks targeting critical public institutions and businesses, and sophisticated social engineering campaigns bombarding your business day and night.

The good news is, as the importance of DRaaS has risen, the affordability has too. Many savvy organizations are leveraging the flexibility and rapid responsiveness inherent in cloud-enabled backup and recovery. After all, one of the many reasons that you adopted a cloud model was to get away from the capital costs and ongoing operating expenses associated with running and maintaining your own internal data infrastructure. Now that there are a range of cost-effective disaster recovery services available, businesses are finding that DRaaS makes good common sense.

In addition to helping you to recover from a disaster, an experienced DRaaS provider can also proactively help you to prevent data disasters from occurring in the first place, and enable your business to work securely no matter where your end users are located. As a third-party specializing in helping businesses to recover from various disasters, they are best placed to anticipate what your business might face in the future. They can help you to design your security approach, as well as prioritize your data resources, segmenting them and working with you to create a plan for ensuring that the most critical data is restored as quickly as possible to keep you up and running.

The possibility of remote working and cloud-based services have been a godsend for many businesses, allowing them to remain operational in these difficult times. It is unlikely that the workplace will return to what it was and remote work is probably the new normal or highly significant for many businesses going forward. Your DRaaS provider can make sure that you do it securely and ensure that you can also recover gracefully if anything does go wrong.

Want to know more?

Storagepipe to the Rescue

Your Backup and Disaster Recovery Heroes

Storagepipe is a trusted global DRaaS provider of comprehensive Cloud, Data Protection and Cybersecurity services and can help to provide guidance as you work through your SMB or enterprise DR planning process.

Since 2001, Storagepipe has provided these robust and secure Managed Cloud and Disaster Recovery solutions from a scalable multi-tenant infrastructure, supported by our first-class in-house technical team. Storagepipe delivers highly flexible and responsive solutions with outstanding value and service, using state-of-the-art technology to offer ultimate protection and peace of mind. Storagepipe is an accredited Microsoft Office Level 1 backup and DRaaS provider.

We are driven to be your trusted partner and to ensure that we deliver a Storagepipe Experience that meets your business requirements with the reliability, scalability and support that your business demands.

Contact us today to discover your options around partnering with us to provide your customers with data loss prevention solutions and rapid ransomware recovery with services such as Cloud to Cloud Backup for Microsoft 365email archiving, and Storagepipe DR services. Regardless of internal user error, ransomware attacks, or when a health disaster strikes, ensure your business continuity by meeting your operational demands while protecting and recovering your most valuable asset – your data.

Questions? Ask Our Experts!

How to Secure Remote Access?

Categories

Secure remote access safeguards sensitive data transmission when applications are accessed from devices outside of the corporate network. It also enhances cybersecurity by introducing complexities for threat actors. In many cases, vulnerabilities in software applications, especially critical ones, may become harder to exploit as the configuration of the service begins to move away from the generic default to a more customized configuration.

What is Secure Remote Access?

Secure remote access is an umbrella under which a number of security strategies reside. It can refer to any security policy or solution that prevents unauthorized access to your network or sensitive data.

With more remote workers, different techniques may include the use of both VPN and RDP together (using different authentication mechanisms), implementation of multi-factor authentication (MFA), restrictions on which accounts may use remote access, during what times, with what password strength, and internal operating system controls that manage and protect passwords and authentication processes.

Why is Secure Remote Access Important?

If an organization does not implement any other layers of authentication besides the standard login with a username and password, there is a higher probability of a successful ransomware attack which could result in encryption and exfiltration of data, demands for payment, damage to reputation as well as lost data and revenue.

Read our Ransomware Best Practices eBook for insights on security threats and steps that you can take to mitigate your risk and rapidly recover from an attack.

Remote Access Risk Mitigation While Keeping it Simple

Some of the most effective ways to potentially reduce the risks associated with remote access systems are also some of the simplest:

  1. Disable remote access technologies if not absolutely required for the business.
  2. Restrict remote access to only the users that require such access, and restrict individual user access to only the services/systems that such users may require.
  3. Use current versions of operating systems and applications, and regularly update and patch. Critical patches should be applied to remote access systems within 3-7 days.
  4. Enforce a strong password policy with regular password changes. Strong password policy means both strength of the password but also complexity, lock-out policies and similar settings.
  5. Restrict and segment remote access services based on data classification.
  6. Use a VPN with MFA if you do use RDP.
  7. Where possible use multiple account login credentials as opposed to configuring all layers to authenticate via the same active directory.
  8. Implement internal monitoring tools to ensure that access is being used correctly and that systems are not being accessed outside of normal parameters.

Storagepipe Can Help

Old access security measures are no longer enough to ensure that your cybersecurity strategy is protecting your data and business continuity, and must be replaced with safeguards that allow employees and other verified users safe and secure access from anywhere, at any time, from any device.

We can provide your business with a suite of customized options to safeguard your business. Contact us now to get started.

Storagepipe to the Rescue

Your Backup and Disaster Recovery Heroes

Storagepipe is a trusted global provider of comprehensive cloud, data protection and security services.

Since 2001, Storagepipe has provided these robust and secure managed cloud and disaster recovery solutions from a scalable multi-tenant infrastructure, supported by our first-class in-house technical team. Storagepipe delivers highly flexible and responsive solutions with outstanding value and service, using state-of-the-art technology to offer ultimate protection and peace of mind.

We are driven to be your trusted partner and to ensure that we deliver a Storagepipe Experience that meets your business requirements with the reliability, scalability and support that your business demands.

Contact us today to discover your options around data loss prevention and rapid ransomware recovery with services such as DRaaS Veeam managed appliance for VMWare and HyperVDRaaS physical server replication, and other Storagepipe DR services. Ensure your business continuity by meeting your operational demands while protecting and recovering your most valuable asset – your data.

Questions? Ask Our Experts!

IT Disaster Recovery Planning: Minimize Your Risk

Categories

In today’s digital world, technology disruption for even a few hours can result in significant financial consequences to your business. It’s crucial for businesses of all sizes to practice IT Disaster Recovery Planning so that they have procedures and solutions in place in case of an emergency. In fact, according to Gartner, the average cost of IT downtime is $5,600 USD per minute or more than $300,000 per hour. For large organizations, that number tops half a million dollars.

Ensuring that your assets, data and hardware are protected is only part of a disaster recovery plan – the rest is determining a process for how quickly you can be back up and running. Rather than scrambling to put the pieces back together after a major storm or cyber-attack, smart businesses put a plan in place well before a disaster occurs.Here are the five key elements to think about when creating your business disaster recovery plan:

  1. Data continuity: Explore exactly what data your business requires in order to run, including what your organization needs to ensure successful operations, financial processing, availability of supplies, and communications. Grade each element in order of criticality, and identify the systems, staffing, and other factors that it depends on and influences.
  2. Communication plan and role assignments: When it comes to mitigating and surviving a disaster, communication is of the essence. A plan is essential because it puts all employees on the same page with clear procedures and contact information for key stakeholders and vendors.
  3. Detailed asset inventory: When it comes to a disaster and insurance, it’s crucial to have a detailed inventory of workstations, their components, servers, printers, scanners, phones, tablets and other technologies that your organization uses. This will give you a quick reference for insurance claims after a major disaster by providing your adjuster with a simple list (with photos) of any inventory you have.
  4. Plan for your equipment: It’s important that you have a plan for how to protect your equipment when a disaster happens. In-case of a flood, what equipment do you need to get off the floor? During a ransomware attack, where are your backups? Do you have a secondary backup?
  5. Backup testing: Regularly test to make sure that your backup is running as scheduled, and include running additional local and offsite backups on all servers and data in your disaster preparation plan. Run them as far in advance as possible, and make sure that they’re backed up to a location that will not be impacted by the disaster. If you are using a third party, are you doing regular backup testing with them? Do you know who to reach out to?

Get Your Free IT Disaster Recovery Planning Template

In our digital world, disasters that affect our data and applications are a given. Whether it’s a deleted file, a ransomware attack, or a large-scale natural disaster, there are constant threats to IT infrastructure and the businesses that depends on them. But you can minimize the impact of an outage by making a disaster recovery plan and business continuity plan.

Download our free IT Disaster Recovery Plan Template to minimize negative impacts to company operations, people, and assets. Download now!

The Storagepipe Experience

Your Backup and Disaster Recovery Heroes

Storagepipe is a trusted global provider of comprehensive cloud, data protection and security services. We have been a long standing Veeam partner and are excited to make these latest enhancements available to our customers to further strengthen their solutions.

Since 2001, Storagepipe has provided robust and secure managed cloud and disaster recovery solutions from a scalable multi-tenant infrastructure, supported by our world-class in-house technical team. Storagepipe delivers highly flexible and responsive solutions with outstanding value and service, using state-of-the-art technology to offer ultimate protection and peace of mind.

We are driven to be your trusted partner and to ensure that we deliver a Storagepipe Experience that meets your business requirements with the reliability, scalability and support that your business demands.

Have questions about IT Disaster Recovery Planning? Contact us today!

Questions? Ask Our Experts!

COVID-19 Data Protection: Update from Storagepipe’s CEO

Categories

To our Valued Customers and Partners,

As the world continues to see the spread of COVID-19 (“the novel Coronavirus”) and its related impacts, it becomes more and more evident that we are all increasingly affected in some ways. By now we all have needed to make some adjustments to our daily routines and our businesses.

As the situation continues to evolve, the health, safety and well-being of every one of our employees, customers and stakeholders remains our top priority. Currently, all of our offices remain open, however we have implemented several business continuity protocols including remote working for a majority of our staff, limited in-person meetings and restricted most travel. We have also promoted increased social distancing to help our communities to stay healthy, and our leadership team is closely following the guidance of public health experts to adjust our response as needed.

It is currently unclear how this situation will unfold over the next weeks and months; however, our Partners and Clients depend on us to keep their businesses running and we will not let you down. Storagepipe will ensure continued and successful operation for all and I have complete confidence that we will continue to deliver without any service interruption or distraction. Our services will stay as high a quality as ever and will remain in full effect at every service level.

As the global workforce temporarily shifts to more remote access options, we anticipate that our customers may need increased support for collaboration with Office 365, Microsoft Cloud Backup and storage, end-user Endpoint Protection and assistance with Cybersecurity concerns. We are ready and able to assist with these needs and many more.

Keep in mind that an increase in staff working from home can create new vulnerabilities. Our team at Storagepipe advises our customers to be aware of social engineering attacks that are currently being launched by threat actors, including phishing emails and malicious websites that are disguised as helpful information around the COVID-19 pandemic, such as apps claiming to track updates in real time, and fake research donation sites. Read our full Ransomware Best Practices eBook here for helpful insights.

While this worldwide outbreak is unprecedented, Storagepipe is accustomed to volatile and uncertain situations and is ready to assist you. Please contact us at the details below. Thank you for your trust and confidence. We will get through this together.

Thanks as always and stay healthy,

Steven Rodin
CEO, Storagepipe

Questions? Ask Our Experts!

Storagepipe, Storagepipe Inc, Storagepipe Cloud Services, Storagepipe Canada, Storagepipe Veeam Partner, Storagepipe VMware, Storagepipe Backup, Storagepipe Cloud Backup, Storagepipe Disaster Recovery, Disaster Recovery, Disaster Recovery as a Service DRaaS, DRaaS, DR, Backup as a Service, BaaS, Backup as a Service BaaS, Covid-19 Data Protection

Veeam V10: What’s New for Data Protection and Recovery?

Categories

Congratulations to Veeam for their release of V10! Storagepipe is very excited about this release, and our team has already been working with pre-release versions to get ready for the big launch. As a result, the team at Storagepipe is ready day 1 to provide our small, medium, and enterprise customers with a rapid and seamless transition.

Veeam is delivering a wide range of enhancements and great new features for cloud backup and recovery in the new Veeam Backup and Replication 10 (V10) release. Our data protection and recovery experts have been exploring what’s new in V10, and we can’t wait to share with you information about the many features that are strengthening data protection and improving the speed of disaster recovery.

Have questions? Talk to us about V10!

Veeam Cloud Connect Improvements

Storagepipe leverages Veeam’s Cloud Connect to provide a fully integrated, fast and secure way to back up, restore, replicate, and failover to the cloud. Storagepipe’s local backup appliance options, combined with offsite backup copies, gives a complete out-of-band protection solution where backups are taken and then automatically sent to the Storagepipe cloud.

Veeam 10’s new Cloud Tier Copy Mode will allow us to improve offsite performance by maximizing customer bandwidth and instantly copying changed blocks when local backups are complete. Additional protections against ransomware and malware are also available since copied backups can be made immutable to protect against deletion, hackers, and malicious insider threats.

The new V10 Backup Resume and Cache functionality for Veeam Cloud Connect ensures that direct-to-cloud Workstation backups never-fail, even when someone shuts off their laptop or otherwise interrupts the process. Instead, the data is cached, the process is paused, and the backup resumes once the Workstation is live again.

Storagepipe provides data security and performance for the cloud with WAN acceleration and encryption of data during transport and at rest to provide fast and secure replications and backup copies. With V10, this has become further optimized with a new performance mode that better utilizes your Internet and Wide Area Network (WAN) capacities.

V10 also includes enhancements for some platforms, such as the new Linux Backup Proxies and new Linux VIX Support that enable the same scale that you expect from Windows based operations, without sacrificing on cost and security.

Veeam Availability Platform Improvements

Veeam V10 further improves the visibility across physical, virtual, cloud and SaaS operations with the Veeam Availability Platform. Customers will really appreciate the complete solution to evolve the way they manage data, from policy-based to behavior-based. This makes it smarter, self-governing, and ensures availability across any application and cloud infrastructure.

Visibility and control via a single platform provide:

  • Orchestration of availability, agility, and acceleration across infrastructures and workloads
  • Monitoring and intelligent analysis of data and the systems utilizing it
  • Integrations and interfaces across a large ecosystem of Veeam and Storagepipe partners

Rolling out the new Availability Platform on Storagepipe Veeam Appliances to protect VMWare, Hyper-V and Nutanix is starting with the release of v10. The many improvements and enhancements enable our customers to modernize their availability practices, achieve improved data management, and ultimately drive better business outcomes in both a painless and seamless fashion.

Enhanced NAS Backup

Storagepipe has been waiting like many others for Veeam’s release of NAS capability, and it has clearly been worth the wait. Our testing shows an effective solution to modernize and simplify the protection of large file shares and file servers.

The powerful NAS backup, monitoring, and reporting capabilities come with built-in CRC support for rapid and reliable backups of NFS, SMB/CIFS share and file servers, eliminating the need for specialized storage for unstructured file data and servers.

We are excited about incorporating NAS protection into the overall Veeam service portfolio while maintaining the ease of use and powerful capabilities of the Veeam solutions.

Next Generation Instant VM Recovery

V10 enables faster restorations with their Next Generation Instant VM Recovery® Engine.

Storagepipe testing reveals significant advantages with the new Instant Recovery Engine including additional data recovery and portability options, enabling you to instantly recover any Veeam backup to VMware VSphere and Hyper-V within minutes – reducing your downtime and damage to your business.

We also think that the new ability to restore from disks instead of large VMs makes it possible to improve our customer’s realized recovery time objectives (RTOs) for bare-metal hosted VMs.

By working with Storagepipe to identify your priority data, applications, and systems pre-data disaster, when a natural or manmade disaster does strike, the Storagepipe team can further reduce your recovery time by utilizing this new feature to restore in order of criticality and dependency.

Cybersecurity

Storagepipe is pleased to see that V10 brings new resiliency features to protect from local storage or site wide production outages. This allows for recovery and rebuild from object storage, as well as new protections for public, private, and hybrid cloud with enhanced object storage integration, object lock functionality, and immutable backups.

These protections include preventative safeguards against ransomware, insider threats, and user error by air gapping for the cloud with intelligent immutability mode for Cloud Tier, new to V10. Storagepipe’s S3 Compatible Cloud Storage and our capacity tier options for Cloud Connect archiving ensures offsite data protection along with data security and redundancy.

V10 also builds on previously released security enhancements for Veeam backup for Office 365 that Storagepipe has already rolled out in our Cloud to Cloud Veeam Backup for Microsoft Office 365 for a truly powerful SaaS data protection solution.

The Storagepipe Experience

Your V10 Backup and Disaster Recovery Heroes

Storagepipe is a trusted global provider of comprehensive cloud, data protection and security services. We have been a long standing Veeam partner and are excited to make these latest enhancements available to our customers to further strengthen their solutions.

Since 2001, Storagepipe has provided robust and secure Managed Cloud and Disaster Recovery solutions from a scalable multi-tenant infrastructure, supported by our world-class in-house technical team. Storagepipe delivers highly flexible and responsive solutions with outstanding value and service, using state-of-the-art technology to offer ultimate protection and peace of mind.

We are driven to be your trusted partner and to ensure that we deliver a Storagepipe Experience that meets your business requirements with the reliability, scalability and support that your business demands.

Contact us today for a one-on-one consultation on how Veeam V10 can benefit your business.

Questions? Ask Our Experts!

Why Office 365 Backup is Worth the Investment

Categories

Office 365 has many great features but full data backup is not one of them.

Switching to Office 365 is a smart business decision for organizations looking to enhance business agility, strengthen team communication and collaboration, and decrease the time and money spent on on-premise IT systems. However, you cannot harness the full benefits of Office 365, including Exchange Online, SharePoint Online and OneDrive without investing in a good Office 365 backup service.

Many IT professionals incorrectly assume that Microsoft will have a full copy of their data in the event of data loss, but the reality is that Microsoft’s policies do not guarantee complete and speedy restore of lost data. In cases where Microsoft may be able to retrieve the data, the process is still slow and cumbersome.

By investing in a comprehensive Office 365 backup solution, businesses can:

1. Mitigate the impact of human error

Mistakes like email, file and user account deletions happen all too frequently and account for significant productivity loss. An Office 365 backup solution lets IT administrators easily retrieve purged files, saving businesses valuable time and money.

2. Maintain access to data beyond basic retention policies

Office 365’s retention policy includes a brief retention period, typically ranging from 30 to 180 days. Quite frequently, data such as historical reports and emails, are needed much later to solve business problems, serve customers and/or to comply with audits.

3. Adhere to audit and compliance requirements

GDPR, PIPEDA, HIPPA and other regulations require businesses to maintain intact records for multiple years. Data backup and archiving solutions can help businesses remain compliant. Businesses remain protected from risks of legal action, potential public backlash and financial penalties that are associated with incomplete records.

4. Stay protected from cyber threats

Ransomware incidents have been front and center these days and show no signs of slowing down. By maintaining offsite/cloud backup of all their data, businesses can take the power away from cybercriminals and face cyber threats head on.

5. Get peace of mind knowing your data isn’t going anywhere

Ask yourself, how long can your business successfully operate without its data? A good Office 365 backup solution eliminates that what-if scenario by providing full data protection and complete peace of mind.

Get Complete M365 Data Protection

Storagepipe, Backup, Cloud Backup, Backup as a Service, Backup as a Service (BaaS), BaaS, Disaster Recovery, Disaster Recovery as a Service, Disaster Recovery as a Service (DRaaS), DRaaS, Backup and Recovery, Backup and Replication, Veeam Backup, Veeam Cloud Connect, Veeam Cloud Backup, Veeam Backup and Replication, Veeam Replication, High Availability, Hot Site, Backup Services, Data Recovery, Data Recovery Services, Cloud Backup Services, Cloud Backup Service Provider, M365 Backup, Microsoft 365 Backup, Microsoft 365 Cloud Backup, Managed Microsoft, Managed Microsoft 365, Managed Microsoft 365 Backup, Managed Microsoft 365 Cloud, Managed Microsoft 365 Cloud Backup, Microsoft 365 Protection, Managed Microsoft 365 Protection, Managed Anti-Spam, Managed Antispam, Managed Anti-Spam Services, Anti-Spam Services, Exchange Online, Exchange Online Anti-Spam, Email Anti-Spam, Microsoft 365 Email, Microsoft 365 Anti-Spam Email, Microsoft 365 sale, M365 sale, Microsoft 365 offer, M365 sale, Managed Microsoft 365 sale

Enjoy complete protection for your Microsoft 365 email and data with cloud backup and managed anti-spam services for only $2 a month per user, plus backup storage.

Cloud-based spam and phishing attack prevention and cloud backup for Exchange Online, Teams, SharePoint Online and OneDrive for Business are all included.

Click the image above to get started!

M365 Data Protection eBook

Learn more about the reasons why Office 365 data back up is critical for businesses, and how businesses can best backup and protect their Office 365 data in our free whitepaper. Download Why Smart Business Leaders Are Investing in Office 365 Backup.