5 Best Practices to Improve Data Security

Cyber security starts internally. From new security solutions to software updates, there are plenty of ways you can help keep your company safe.
Read more

5 Things You Need to Know About Cloud Computing Services

The cloud has been around for quite a while now, but it still feels pretty new and foreign to most of us. When someone says your data has been stored in the cloud what does that mean?
Read more

Announcing general availability of App Service Mobile Apps

We recently rolled out a number of updates to App Service Mobile Apps making it a better platform for building and running mobile backends. Today, I am excited to announce general availability of App Service Mobile Apps, as well as one-click zero downtime migration capability for your existing[...]

Read more

Announcing general availability of AzCopy 5.0 with File and Table Storage support

We are pleased to announce the general availability of AzCopy 5.0, which now supports File and Table Storage. With this release, we have officially released all features for AzCopy.

Read more

Announcing Microsoft Azure Backup Server

Microsoft Azure Backup Server is included as a free download with Azure Backup that enables cloud backups and disk backups for key Microsoft workloads like SQL, SharePoint and Exchange regardless if these workloads are running on Hyper-V, VMware or Physical servers. We had previously released[...]

Read more

Announcing SQL Data Warehouse availability in India

We’re excited to announce the public preview availability of Azure SQL Data Warehouse in all three Azure India data centers (Central, West and South India). The availability of Azure SQL Data Warehouse in the India data centers expands our regional support for scaled out data warehouses, thus[...]

Read more

Azure Container Service preview

Today we are making a preview of Azure Container Service (ACS) available to our customers. ACS is an Azure Compute resource provider to create and manage a cluster of virtual machines that act as container hosts together with a number of "master" machines that are used to orchestrate your[...]

Read more

Azure DocumentDB is now available in Central US

We are happy to announce the expanded regional availability of DocumentDB. You can now provision DocumentDB accounts in the Central US region, bringing the total region count up to 15! Azure DocumentDB is now available in the following regions: East US, West US, South Central US, Central US, North[...]

Read more

Azure DocumentDB is now available in Japan East and Japan West

We are happy to announce the expanded regional availability of DocumentDB. You can now provision DocumentDB accounts in the Japan East and Japan West regions, bringing the total region count up to 15! Azure DocumentDB is now available in the following regions: East US, West US, South Central US,[...]

Read more

Azure Redis Cache: General availability of Premium tier

The Azure Redis Cache team is very excited to announce the general availability of Azure Redis Cache Premium tier. This offering is an Enterprise-ready tier designed for maximum scale and integration.

Read more

Choosing the Best File Storage Option for Your Business

Secure file storage used to mean keeping your files in a filing cabinet or in file boxes.
Read more

Why Your Business Needs Data Backup and Recovery

If you run a small business, it’s easy for seemingly minor details or business-related tasks to slip through your fingers.

Unfortunately, one of the tasks businesses often overlook is one of the most important: data safety. Every business needs data backup and recovery to protect themselves[...]

Read more

Why Your Organization Needs Vulnerability Management

From antivirus software to firewalls and VPNs, you’ve done your best to ensure your company has incredible network security.

But no matter how many security measures you put in place, there are still vulnerabilities in your network. One of the best ways to stay ahead of online threats is by[...]

Read more

3 Tips to Destroy Sensitive Data & Information

Data destruction used to be simple. You’d take your files to the office shredder, toss them in, and they’d be effectively destroyed...
Read more

3 Responses After a Ransomware Attack

If you're unfortunate enough to be the victim of a ransomware attack, there are basically only three options open to you.
Read more

The Business Toolkit for Cyber Security Awareness Month

Were you aware? October is Cyber Security Awareness Month. As more companies move in to the online space, computer security is becoming increasingly important. You need to know how to protect your company from costly data loss.
Read more

Worst Passwords of 2018

Computer passwords aren’t something we pay much attention to.

When we get to the office in the mornings, we enter our username and password and then forget about our password again until the next day. However, with increasing concerns about cyber security, many people are now paying more[...]

Read more

The Biggest Cyber Attacks of 2018

There are over a million people online, and every day there are people and companies that fall prey to cyber attacks.
Read more

Your Business Needs the Cloud. Here's Why

Businesses of all sizes are now turning to the cloud for their software and hardware solutions, as well as for data storage.
Read more

Start 2019 By Building a Cyber Security Culture

As we move into 2019, we continue to rely on automated programs and technology in our day-to-day lives. With this growing reliance comes a growing concern about online safety.
Read more

How to Make File Sharing with Clients Easy

As a vendor or even a customer, have you had the experience of working with a new company and having to learn yet another file sharing platform?
Read more

Is it Safe to Use Public WiFi?

Using public WiFi is like having a conversation in public. You never really know who's listening in.
Read more

How to Prepare Your Business for a Phishing Scam

Working online comes with certain risks. There are computer viruses, malware, spyware, worms, Trojan horses, and ransomware – just to name a few. With all of these potential threats, how can you keep your company safe online?
Read more

Digital Disasters Happen: Do You Have a Cyber Attack Plan?

We live in an online age. As a business owner, you rely on your computer systems to keep your company running. Unfortunately, with an increased reliance on computer networks comes the increased risk of cyber security incidents.
Read more

4 Reasons to Use a Multi-Cloud Strategy for Your Data

Plenty of IT providers have been moving toward multi-cloud strategies, both internally and for their clients. Why is that? We’ll dive deeper into the benefits of multi-cloud strategies. But first, let’s define exactly what they are.
Read more

Cyber Security Isn’t Just a Concern for Big Businesses. Here's Why It Matters for Small and Midsize Businesses, Too

Whenever there’s a cyber security story in the news, it’s always about a multinational corporation. This can give small and midsize businesses (SMBs) a false sense of security.
Read more

Manage Your Mobile Security Threats

As technology becomes more and more mobile, the number of devices employees use for work tasks increases.

Employees are using mobile phones, tablets, iPads, and public Wi-Fi to collect and send sensitive data. If your business is turning to mobile solutions, you might be wondering, do these[...]

Read more