top of page

StorageCraft Blog Posts

Thus far, my journey has presented me with a myriad of opportunities to flex my blog writing muscles. A particularly challenging one was writing articles for StoreageCraft Technology Corp, a backup and disaster recovery software company. The topics were far out of my wheelhouse, and required plenty of research to execute accurately. Here are some sample posts I developed.

AdobeStock_91559062.jpeg

4 Ways Educational Institutions Can Benefit from Cloud Services

Since the cloud emerged on the scene as a revolutionary concept in the mid-1990s, the way businesses store, sort, and protect their data has completely changed. The cloud is a time- and money-saver and almost always a safe bet.

Keep reading > 

AdobeStock_96191614-1.jpeg

4 Steps to Take When Someone Breaches Your Data

IT teams have many important jobs, and one of those is drafting a data security strategy for their business. And, since no plan is perfect, a key part of this strategy is devising a plan of action in case a hacker infiltrates the security measures in place. 

Keep reading >

zeros-ones-digital-3d-concept.jpg

How to Choose the Right Data Backup Solution for Your Business

As an IT decision-maker in your organization, nobody knows the data needs of your business better than you do. When you’re searching for a data backup and recovery solution to suit your business best, be sure to ask yourself the following questions first. 

Keep reading >

AdobeStock_162980569.jpeg

Have You Heard of Jackware?

The IT world is no longer a stranger to ransomware. All of us are aware of the vast amount of damage it can do, only having to look so far as last year’s WannaCry virus for an example of its destructive capabilities. 

Keep reading >

AdobeStock_77254600.jpeg

The Trojan Virus is Evolving, Here’s How…

The Trojan virus can be traced back all the way to the 1980s. Though Trojans have been around for a long time, many people don’t know the first thing about them. This is proved by the fact that so many users around the globe are still fooled by hackers into downloading malware.

Keep reading >

AdobeStock_143540997v2.jpg

How to Stay Protected Against Phishing Scams

Over the years, phishing has become more and more popular, evolving in complexity from its conception in the 1990’s. At its core, phishing is a type of cyberattack hackers implement to obtain access to your private or sensitive information.

Keep reading >

AdobeStock_87635179.jpeg

4 Ways to Reduce Your Risk of Server Failure

Possibly the most unnerving and damaging event that can happen to an MSP is a server failure. If your server goes down, so does your business, until the issue is resolved, and downtime can cost you thousands.

Keep reading >

bottom of page