Many ransomware strains such as WannaCry, already have the ability to remove both system restore points and your Windows backups altogether.
Rather worryingly, experts also suggest that ransomware is expected to increasingly target backup files in the future.
With that in mind, we’re particularly excited to see BackupAssist v10.1.0 go live today, as it includes CryptoSafeGuard, a free feature designed to tackle these problems head on.
In case you missed my early heads up, the public release of CryptSafeGuard for BackupAssist is now but a few weeks away. It’s an anti-ransomware feature, it’s ever so timely and best of all, it’s free (provided you have valid upgrade cover of course!).
The senior development team over at BackupAssist are excited to let you know just how great it is, and with that in mind, are running a free one-off webinar for resellers on Wednesday 9th August @ 9.30am.
If you can spare the time I highly recommend you attend as it’s a terrific opportunity to learn about a feature that could really help your customers (and you!) out of a tight spot should the unthinkable happen and their files become encrypted.
Not only that but it’s a rare chance to provide your thoughts and suggestions directly to the people who write the software.
With 205 million messages being sent every day, email still remains one of the most popular ways to communicate, which means the mailboxes of many businesses today contain all manner of information concerning both customers and staff.
Whether it’s bank details, employment contracts, IP addresses or altogether more sensitive information, the introduction of the Global Data Protection Regulation (GDPR) in May next year will force companies to take the responsibility of managing this data seriously.
When the Australian development team at BackupAssist let me know there would be an anti-ransomware feature available so soon after the recent high profile cryptolocker attacks, I have to admit, the timing seemed almost a little too convenient.
Until any concrete evidence comes to light, we’ll work on the basis they just know the market, but my investigations will continue nonetheless 🙂
It’s been a couple of months since we announced the launch of BackupAssist v10 and its super efficient new cloud backup engine. The significance of the new engine is that it unlocks the possibility of using public cloud giants AWS and Azure as backup destination options.
While the BackupAssist side of things is typically easy to configure, I’ve had a few requests for help navigating Azure’s configuration options, so in this article, I’ll be walking through the steps as they are today.
Following on from the recent announcement concerning the reduced entry requirements for becoming a MailStore Service Provider, our colleagues over at the German developer have released a number of webinar dates over the coming weeks.
These sessions are a fantastic opportunity to hear directly from the developer and to raise any questions you might have following the short presentation/ walkthrough.
If you’re thinking about building your own archiving as-a-service platform and becoming a MailStore service provider, this is the perfect way to find out more without any pressure or obligation to take it further.
We love the fact MailStore is such a versatile beast.
It’s able to work with pretty much every mail platform on the market and satisfy the vast majority of requirements users throw at it.
However, if you’ve got a large mail server running multiple jobs, or lots of hosted mail accounts, for example, it’s possible at some point that you could find yourself pushing the limits of your hardware or bandwidth.
Optimising it isn’t difficult and largely boils down to how fast and how often you need your new email added to the archive. The temptation when setting it up for the first time is to opt for the ‘as fast as possible’ approach, when in reality you may be hammering your resources unnecessarily.
In this post, I’ll look at that and provide some simple tips for optimising your MailStore installation around your business needs.
Almost exactly three years after its release and with 320 service providers under their belts, MailStore today introduce a new and simplified price model for the Service Provider Edition of their popular email archiving software for Office365, Exchange, MDaemon and other mail platforms.
The changes will be welcome news if you’re an IT support company wanting to ‘dip your toes’ in the services market without a large upfront commitment. Plus existing customers should be pleased to see improved margins as a result of lower ongoing costs too.
Straight out of the box, when you perform searches of your archived email as a MailStore user, it looks for your keywords in the header, body and subject of your messages. What you may not know, however, is that it also has the ability to search within some attachment types too if you enable the feature.
I’ve found this to be incredibly helpful when looking back over conversations with customers, helping me find invoice or project references for example, and I’m sure you’ll find it useful in your working day too.
Attachment searching is actually enabled by default, but it’s limited to only .txt and .HTML file extensions, so you’re not using its full potential.
In this short post, I’ll show you how to enable the feature and get MailStore to re-index your historic email so it works for that too.
Unless you’ve somehow managed to avoid both the news headlines and the barrage of content from IT security vendors that followed, you’ll no doubt be aware that a couple of weeks ago, there was a particularly severe ransomware attack that affected over 100,000 businesses around the globe, including the NHS.
The latest evidence indicates that the recent ‘WannaCry’ attack originated via an exploit tool created by the NSA, however it’s more common they originate via ‘phishing’ emails, the technique of tricking recipients into clicking a malicious link or opening an attachment, often appearing to be from a colleague or relative.
So with this in mind, now seems like a great time to give you a refresher on the features at your disposal as an MDaemon administrator to help prevent the type of phishing attack that can lead to a ransomware infection, along with some additional tips on best practice.
(Almost all of the security tools for MDaemon are in the SecurityPlus add-on so for the purpose of this post, I’ll be assuming you’ve got that installed.)