Backupify Blog

PCI Compliance: What You Need to Know About Office 365 and G Suite

Compliance with PCI requires a multi-layered approach, and securing employee and customer data wherever it lives should be your number one priority.

How Data is Lost in the Cloud

There's a common misconception that everything in the cloud is backed up.

Organizational Units and Permissions in G Suite

In most organizations, your role affects your level of access.

User Access and Authentication Controls in G Suite

​Perhaps the biggest reason more IT managers don’t migrate their organizations to G Suite is a fear that they don’t have the tools at their disposal to make G Suite secure.

Mobile Device Management in Office 365

​Office 365’s mobile device management tools help you manage access to your Office 365 environment through a diverse range of phones and tablets, regardless of operating system.

How to Secure a G Suite Domain: Disaster Recovery Features

Let’s assume that the worst has occurred and your security measures have not prevented unauthorized access to your G Suite domain.

Protecting Your Data from Insider Threats

While international espionage may seem far-fetched for your company’s cloud data, your data’s integrity and security could be compromised at any time by employees looking to capitalize for their own gain.

Four Epic Hacks for Office 365

You’re in the Office 365 club - a club made up of millions around the world who are collaborating easier (and faster) with this online productivity suite.

The Threat of User Error in SaaS Apps

Everything you’ve read about what SaaS and cloud-based storage can do for your business is true -- to a point.

3 Essential Habits of an Office 365 Administrator

​Nearly all of Microsoft's Office 365 administrator advice regards best practices for migrating or adopting O365.

Setting Up External Mail Servers: G Suite and Legacy Systems

​Most likely, you already have an email system. If you don’t have an email system, you’re lucky. (Go directly to “Set up G Suite today.”)

Data Breach Stats You Need to Know

Data breaches make headlines on a weekly basis, and unfortunately, it appears no company is totally safe from cybersecurity threats.

Administrative Privileges and Roles in G Suite

In G Suite, every instance needs someone who can manage different tools and levels of access.

A Cost-Effective Strategy for Cloud-To-Cloud Migration

IT admin? If you’ve ever been responsible for a company’s migration from an on-prem productivity suite, such as Microsoft Office, to a cloud-based equivalent, such as Office 365, you likely remember the experience as complex and time-consuming.

Mobile Security in a G Suite Domain

In the event that a mobile phone, tablet or laptop that has previously been used to access your G Suite domain is stolen, there are some very specific security responses you can employ to keep your G Suite data safe.

How to Choose a SaaS Backup Vendor

Choosing a cloud application backup provider is like any technology decision: there is no one-size-fits-all solution. Your job is to determine which provider offers the best cost/benefit and coverage for your organization’s unique needs.

Email Security Tips for IT Admins

Let’s say you’re pretty certain the email you just received is legitimate, and it has an attachment included with the email that you want to open. You need to scan the attachment first.

What Your Cloud Vendor Doesn't Tell You about Data Loss

If you lose data in Office 365, there is no defined process or rules for recovering it. You can call their support team, but the level of help they offer depends on the scenario.

The IT Admin’s Checklist for Office-Wide Security

Information Technology administrators know the value of computer security. Communicating that value to your end users, however, can often prove to be a challenge.

The Complete Guide to Office 365 Security

Office 365 is the fastest growing offering in Microsoft’s history, and customers are entrusting the platform to not just meet all of their productivity needs, but to secure and manage their business-critical information assets.

Page 1 of 13 1 2 3 4 5 6 > Last >

Featured Resources

Subscribe