Welcome!

Continuum Blog

Subscribe to Continuum Blog: eMailAlertsEmail Alerts
Get Continuum Blog via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Continuum Blog

The Distinction Between Data Backup and Business Continuity by Brandon Garcin Believe it or not, the first data backups were made on paper. Dating back as early as the 18th century, the "technology" was used in the form of paper tapes constructed from punch cards to control the functions of automated machinery such as textile looms. The concept of these cards was then further developed by IBM in the early days of data processing, where data input, storage and commands were captured using a series of hole punches. In 1956, IBM introduced the 350 disk storage unit - the first ever hard disk drive. It was 60 inches in length, stood nearly 70 inches tall and had a capacity of 5 million 6-bit characters - or 3.75 MB of data. And although less than 4 megabytes may not seem like much (a decent cell phone can today take a picture with a larger file size), the 350 unit represe... (more)

Why IT Security Is a Top Concern for SMBs | @CloudExpo #Cloud #Security

Why IT Security Is a Top Concern for SMBs By Lily Teplow Although security is one of the most talked about topics in the IT channel today, there's a widespread lack of education and awareness in the workplace. Small and medium-sized businesses (SMBs) are welcoming more technology into their everyday environment, but the rapid development of this technology is also accompanied by changes in cybersecurity and Internet threats. What these businesses don't know is that they can become more aligned with cybersecurity and IT security spending by outsourcing to an MSP like you. You offe... (more)

DDoS Attacks: An Overview of the Business-Crippling Cyber Threat All MSPs Should Watch for

We all want to drive more traffic to our websites to convert visitors into leads and then close those leads into customers. Unfortunately, not all traffic is good traffic. Traffic can also be used as a malicious tool against your website. If you want to understand the whole spectrum of cybercrime, you can't just stop at ransomware and phishing schemes. One attack that has become more and more common across the web in recent years is known as the DDoS, or Distributed Denial of Service, attack. DDoS attacks have been around for more than a decade, but hackers are constantly findi... (more)

10 Secrets to Being a Successful Leader: Insight from Shark Tank's Kevin O'Leary

  You may recognize Kevin O'Leary as a "Shark" investor on the ABC reality television series, Shark Tank. He is also a celebrated author, business journalist, and most notably, a powerful leader, having founded a successful software company and the O'Leary Financial Group. Recently, I had the pleasure of seeing Kevin O'Leary speak at the Robin Robins 2015 IT Sales and Marketing Boot Camp. There were many takeaways from O'Leary's time on stage, but the most captivating part of "Mr. Wonderful's" presentation was his analysis of what makes a true leader.  ... (more)

What to Do with All of That Data By @LilyTeplow | @BigDataExpo #BigData

What to Do with All of That Data: Retention Best Practices by Lily Teplow Imagine for a moment that you have three doors in front of you containing the data your clients have backed up. Behind door number one lies a complicated clutter of data, various files, and unidentifiable information. Behind door number two you have a data desert, with little or no available information. Finally, behind door number three is a perfectly organized system of saving exactly what is needed and disposing of what isn't. I'm guessing if you had the choice, you'd probably choose door number three, bu... (more)