January 18, 2021
Are You Running Out of Backup Window?
If you are running out of backup window, here are 3 questions you need to ask yourself
January 14, 2021
The Case for Virtual Tape Library (aka VTL)
Any customer looking to upgrade their tape drive or buy a net new one should really take pause and consider VTL
November 30, 2020
Backup Your Office 365 Data
Veeam® Backup for O365 eliminates the risk of losing access and control over your data including Exchange Online, SharePoint Online OneDrive for Business and Microsoft Teams
November 2, 2020
Veeam Backup for Microsoft Office 365 – Demo Video
Veeam® Backup for Microsoft Office 365 eliminates the risk of losing access and control over your Office 365 data including Exchange Online, SharePoint Online OneDrive for Business and Microsoft Teams – so that your data is always protected.
September 11, 2020
Responding to a Disaster Using a Framework
Today, to meet the demands of the issues facing your business, the plan must be fluid and more importantly actionable.
May 20, 2020
The Importance Of Cyber Insurance
I’ve been in the cybersecurity industry for pretty much my entire adult life; it’s the only career I’ve ever had. And yet one of my favorite cybersecurity solutions to recommend to organizations is not even a solution I can provide for them. I’m talking about cyber insurance.
May 13, 2020
Why Cybersecurity Is So Complicated
When you think of problems people had with cell phones back in the 80s, whether you experienced them firsthand or you’ve seen clips from movies, you know that it’s a completely different mobile world we live in today. That seems to be the case with most tech industries — regardless of the problems that first appear, they all get eliminated eventually until we are living in a completely different world.
May 8, 2020
Top Takeaways from ESG’s White Paper on Multicloud Storage Environments
Research shows that when an organization has taken the necessary steps to reach Storage Maturity, they have a competitive advantage due to their ability to properly harness the power of their data.
April 11, 2020
Home Cyber Hygiene Checklist
Our homes are becoming smarter and, as cool as that is, what’s even cooler are people who are as smart as their smart homes.
April 3, 2020
A New Opportunity for Cyber Attacks
There's a cybersecurity threat so troublesome that not even some of the best cybersecurity technology can stop it. It's called psychology, and it's used in any number of cybercrime attacks.
March 30, 2020
An important message to our customers & suppliers
At Mid-Range, the health of our employees, customers, partners and suppliers is our top priority. As we face the COVID-19 crisis, we would like to assure you that we will continue to help you navigate
March 27, 2020
7 Cybersecurity Tips
For today’s enterprise, the question is not whether you will be attacked. It’s when, by what, and how badly your company’s reputation or finances will be damaged. A Disaster Recovery Plan is key.
March 17, 2020
The Cybercrime Equation
Learn the best ways to keep your systems and your data safe from ransomware attacks, with advice from Danny Pehar, Bestselling Cybersecurity Author and Technology Council Member at Forbes.
January 28, 2020
The Three “V”s of Big Data
Before you create your first draft of the schema or the architecture you must put into perspective this part of the problem you are being asked to solve. You must deal with the three “V”s of data which are volume, velocity, and variety.
October 1, 2019
Mid-Range achieved Platinum Partner Status with IBM!
This is an achievement that few businesses are able to achieve, and requires dedication and success beyond industry averages.
As an IBM Platinum Partner, we have access to IBM resources and training to supplement our already vast range of knowledge and experience in IT.
August 12, 2019
October 29th Cybersecurity Awareness Leadership Lessons
Danny Pehar, Cybersecurity Expert and Forbes Author, teamed up with Mid-Range to deliver cybersecurity training during a recent event in Toronto, Ontario.
The event put a strong focus on security training to combat enterprise-level ransomware and fraud. Learn some of the key highlights and advice: