The latest News and Information on Managed Service Providers and related technologies.
Today, almost every IT department or MSP uses some form of mobile technology. Even though smartphones, laptops, tablets, and other mobile endpoints are incredibly useful for an organization, they can be difficult to manage. TechFunnel’s article on mobile devices in the workplace announces that one laptop is stolen every 53 seconds, while 7 million smartphones are lost every year.
As someone who has worked in an office environment for more than 20 years, I never considered the idea of working remotely. But as a result of what’s happened in the world over the past few years, like so many others out there, I find myself working from home full-time now. Don’t get me wrong, there are many benefits to working remotely—none more so for me than not sitting in traffic for an hour in what should have been a 10-minute commute.
Welcome to part 2 of our Patch Management Basics series. In part 1—Learn patch management—we covered what patch management is, how it’s different to vulnerability management, and what the components are that make a good patch management program. In this article, we’re going to go a step deeper and explore the features that make up the best patch management solutions.
Hard drive crash. Ransomware. Equipment failure. Accidental deletion. Theft. There are plenty of reasons why end users want to have a secure and up-to-date backup of their most important files. And there are just as many approaches to backup and recovery as there are reasons to want it in place. In this article, we’ll discuss practical strategies and best practices for backing up important data, including consumer-level options and how to get the most from an enterprise-grade backup solution.