Client Area

This section can be repurposed a number of ways.

September 2022

Cloud Prisoner

Don’t become a prisoner of your computing infrastructure or private cloud. Understand who has custody of your data. 

The cloud simplifies remote access, business continuity, and disaster recovery. But what happens when you change IT service vendors? 

‍From basic services like email and Office365 to Infrastructure as a Service and complete virtual desktop, an organization can gain flexibility, redundancy, business continuity, security, and even competitive advantage by working in a Cloud environment. 


As reported on by HelpNet Security in late 2020, high-availability access, on-demand computing power, limitless storage, and enterprise grade security lifted the rate of Cloud adoption among small/mid-size businesses even before the pandemic, and hit ludicrous speed once the remote workforce took to their homes. 

Since most organizations will use a technology integrator or managed service provider for the migration, what happens when that vendor is no longer providing services? Even without a “long-term contract”, because of how some Cloud environments are designed, a business can get stuck in a scenario that makes it hard to change IT vendors. So, how can your business stay protected? Here’s what you need to know: 

1) When MSPs first began considering Cloud for their clients (almost a decade ago) public Cloud wasn’t what it is today, and most built their own.

2) Leveraging private data centers, these technology firms invested in massive infrastructure, and built highly proprietary “walled gardens
3) Offering clients a scalable environment with business continuity and integrated disaster recovery, a solution was born
4) Over the years, IT firms spent hundreds of thousands of dollars in capital expenses and upgrades to ensure performance, availability, and security. Changing their Cloud offering isn’t typically an option
5) Clients in these environments have only one choice when it comes to who can provide services/support. Migrating to a new platform is costly and time intensive

Technology firms that made the leap to offer public infrastructure do see thinner margins, but they also have access to the most cutting-edge technology, integrated cybersecurity tools, and tremendous flexibility for clients that understand data custody and have concerns about uprooting an entire virtual ecosystem if the need for a new technology partner arises.

So What Can You Do?


Understanding who has custody of your data (where data resides), how it’s accessed, and what’s involved when it comes time to sever a relationship is critical, and it’s up to you, the client, to figure it out. Here are some questions to ask:

  • Where exactly is your data stored? 
  • What virtualization tools/systems are used for access?
  • Is there anything proprietary about the infrastructure?
  • Is there anything proprietary about the access tools? 
  • What happens if the vendor is no longer providing service?
  • Is it a total “lift and shift” of your data, email and apps?
  • Is it simply changing the owner of record?
  • What’s involved in a typical migration?
  • If possible, speak with references and even former clients to discuss their migration experience

At the end of the day, no one of us want to think about ending a relationship before things even get started. But since change is one of the few constants, being prepared is critical and it’s always better to address these issues now when the relationship is healthy.


We’d love to hear your thoughts on Cloud adoption, or a story relating to Cloud on-boarding/off-boarding. Drop your info below, set a time on our calendar or shoot us an email.

Backup Testing

These days almost every business has a data back-up process.  But who’s testing the restore?


Last year, John Edwards, from Tech Target wrote that “creating and adopting a data backup plan is only the first step. To achieve complete data protection, you also need a backup testing strategy.” 


We agree and have republished his 10 Step Guide for Testing Backups below. 

1. Understand why backup testing is important and necessary

If files can’t be successfully restored from backup after a system failure or some other type of disaster, there’s a very strong risk that your organization will someday face business and financial catastrophe, including the possibility of fines and lawsuits.


Testing backups ensures that essential data is being fully and accurately preserved. If a test fails, the problem can be fixed before the data is lost forever. Testing backups also validates the effectiveness of the organization’s backup policies and schedules.


2. Create a documented backup testing plan

A documented testing plan ensures that employees have the guidance and rules necessary to successfully perform data recovery, providing confidence that essential files will be rapidly available and fully intact when needed in the event of a primary storage system failure.


The plan should designate the parties in charge of backup testing and how often tests should be conducted.


3. Make testing backups a routine task

To assure backup validity and integrity, it’s essential to carry out regular data restoration tests. Don’t assume that an absence of error messages indicates that backups are running successfully.


Test backups with a full restoration process every week or month — or even more frequently if critical data is involved — to ensure that a hardware or software issue isn’t compromising successful backups. Routine and comprehensive backup testing is necessary to highlight anomalies so that corrective action can be taken.


4. Take a holistic approach to backup testing

Every enterprise needs to understand its unique data layout and backup needs. A backup testing strategy that works well for one organization might be entirely insufficient for another.


Every organization has different backup objectives. Banking industry firms, for example, need accurate backups to meet compliance, audit and legal obligations. Healthcare organizations, meanwhile, are responsible for protecting patient data, so they must focus on security, retention and meeting various legal requirements.


Decide on your backup needs and begin planning from that point. To be thorough, all restore and recovery testing should include data, application and system state testing.


5. Test frequently in sync with a regular schedule

Ideally, a test should be conducted after every backup completes to ensure that data can be successfully accessed and recovered. In the real world, however, such a schedule is usually impractical due to a lack of available resources and/or time constraints.


A general rule of thumb is to commit to a regular schedule of weekly and/or monthly restores of systems, applications and individual files with checks to ensure that the data is valid and accessible as intended. Such an approach will also provide your organization with a realistic time frame for recovery in the event a storage system failure or disaster strikes.


It’s also important to remember that not all data is created equal — a fact that should affect the frequency of backup tests. Some types of data is more important than others. Government- or industry-imposed compliance data, for instance, might be considered more important than marketing data. Advance planning should be used to determine which types of data backups should be subject to more frequent tests.

Originally published at Tech Target, chart shows a backup test schedule for several different types of assets

6. Tap into the power of automation

Automation should play a key role in any backup testing strategy. Organizations should strive to automate as much of their backup testing as possible to ensure consistency and data validity, as well as to reduce the burden on staff charged with testing backups.

Automating the entire backup and testing process will save time and effort, enabling team members to focus on tasks that require their high-level skills and insights.

7. Ensure that the backup test covers all bases

If the backup test doesn’t actually test the entire workload being restored, it can’t be considered a real test. Simply restoring a handful of files from a random archive and declaring success is tempting fate.

Test effectively by restoring complete archives to databases, applications and virtual machines.

8. Make testing backups an integral part of internal app development and deployment

Backup testing should never be an afterthought. Testing should always be kept in mind when developing and introducing new applications to the organization.

The most successful enterprise data management strategies involve knowing how and when to perform backup validation tests before allowing data to move into a production workload.

9. Ensure backup accuracy

Whenever data is restored, storage and database administrators should perform an initial health check to ensure there are no abnormalities or omissions in the recovered files.

A cursory examination might not be sufficient, however. Data that appears accurate to an IT expert might actually contain subtle errors that only a trained eye can detect. The end users of specific business applications are often the individuals best positioned to determine if a set of restored data is accurate and consistent.

10. Create redundant backups

Although cloud backup services are generally reliable, you might want to use at least two services in the event one cloud provider is unavailable when a rapid full restore is necessary or a test reveals some form of data absence or corruption on the cloud provider’s end.

Inside the data center, never back up to only one tape or set of tapes. Maintain multiple backup media sets and test them all before storing the tapes in separate locations. Replace the cartridges every year or two, or even more frequently if signs of damage or wear are detected. The same holds true if hard drives are used for backups.

Published by John Edwards at Tech Target on October 11, 2021

Business Email Compromise –  When the criminal’s reading your email.


We’re all connected – the closer a hacker gets to your vendor, your client, your partner… the closer they are to you. Here’s the story of an advertising agency who thought they were communicating with their event venue.

Inc. estimates 60% of companies go out of business within six months of a cyber attack.

Haven’t we had enough attacks, hacks and breaches? The best offense is a strong defense – it’s time to start defending ourselves! 


Drop your name and email to learn more, or tag our calendar to setup a conversation.