Posts by Jessie Reed
October 18, 2022
Image-Based vs. File-Based Backup Comparison
Discover the differences between image-based and file-based backups. Learn the advantages of image-based backup for today’s complex business IT infrastructures.
by Jessie Reed
October 3, 2022
Microsoft Office 365 Advanced Threat Protection: Complete Overview
Discover Microsoft Defender for Office 365 and the advanced threat protection offered for cloud environments. Learn how to configure the different tools.
by Jessie Reed
October 3, 2022
Office 365 Spam Filter: Setup and Configuration
Learn how to configure Office 365 spam filter and outbound spam filter policy to protect mailboxes with Exchange Online Protection (EOP) and Microsoft Defender.
by Jessie Reed
September 26, 2022
Crash-Consistent vs. Application-Consistent Backup Comparison
Discover how crash-consistent and application-consistent backups work. Learn about their differences and which one to use to create a reliable backup strategy.
by Jessie Reed
September 26, 2022
RTO vs RPO: Understanding the Key Differences for DR
Discover the main differences between RTO and RPO. Learn how to achieve tighter RTO and RPO to ensure quick disaster recovery and maintain business continuity.
by Jessie Reed
September 14, 2022
Threat Investigation and Response in Office 365 Security
Ensure Office 365 security using Microsoft’s threat investigation and response capabilities. Use threat intelligence to proactively protect your environment.
by Jessie Reed
September 13, 2022
Forever Incremental Backups Explained
Learn the differences between incremental and forever incremental backups. Discover how you can implement them in your data protection activities.
by Jessie Reed
August 24, 2022
Office 365 Ransomware Protection and Recovery: A Complete Overview
Ransomware remains a big threat to Microsoft 365. Discover the built-in Office 365 ransomware protection tools and the recovery options available to you in case of data loss.
by Jessie Reed
August 3, 2022
How to Detect Ransomware: Understanding Signs of Infection
Discover the most effective ransomware detection techniques and tools, and learn which steps to take to effectively prevent, detect and respond to ransomware.
by Jessie Reed
August 3, 2022
8 Proven Practices to Protect Against Ransomware
Discover how to protect against ransomware using these 8 best practices. Implement a complete protection approach: prevention, detection and protection.
by Jessie Reed