GTSS Blog

GTS Solutions has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Prepping For A Weather Event Needs To Happen In Your Business

Prepping For A Weather Event Needs To Happen In Your Business

Running a business requires the ability to stay in control, especially when others couldn’t. However, there are some situations--like major weather events--that simply will not be controlled. In cases like these, you need to make sure your business is prepared to withstand the worst. A business continuity plan can help you do so.

0 Comments
Continue reading

Tip of the Week: Google Offers Personal Users A Backup Solution

Tip of the Week: Google Offers Personal Users A Backup Solution

Let’s say that you are a consumer looking to take advantage of data backup in an affordable way. You want a way to keep your data safe in the event of a disaster. For the average PC user, Google Drive now allows users to take backups of specific files and folders via the Backup and Sync application on their desktop PC.

0 Comments
Continue reading

Save Considerable Time By Automating Your Data Backup Process

Save Considerable Time By Automating Your Data Backup Process

Is your organization still relying on antiquated tape backup to keep your data safe? A more reliable, less time-consuming alternative known as image-based, or “snapshot” backup, could change the way that you look at disaster recovery. In fact, image-based backup has the potential to optimize your business’s data continuity.

0 Comments
Continue reading

4 Instances You’ll Be Glad You Had Disaster Recovery

4 Instances You’ll Be Glad You Had Disaster Recovery

Disasters are commonplace in the business environment, especially when you work in a technology-heavy office. It’s not a question of if you’ll ever experience a hardware failure; it’s a question of when you will. Regardless of how your business functions or what sector you fall into, there will always be disasters that you should be prepared for.

0 Comments
Continue reading

Do Memes Have a Place in the Professional Business Environment?

Do Memes Have a Place in the Professional Business Environment?

Whether we like it or not, memes have had a profound effect on how the world’s population views current events and popular culture. In part, this is thanks to the prevalence of the Internet, which has fostered these absurd images and provided them an outlet to flourish. Due to how viral they are, it would be foolish to dismiss them as inconsequential; in fact, when leveraged properly, memes can make a statement about your business and its specific brand.

0 Comments
Continue reading

How NOT to Maintain a Backup

How NOT to Maintain a Backup

A data loss incident is considered a major disaster scenario, especially for small and medium-sized businesses. All it takes is one moment to lose your business’s entire data infrastructure. We’ll walk you through a story that should serve as a cautionary tale, one that hopefully teaches you to adhere to data backup and disaster recovery best practices.


Marco Marsala, a hosting provider, posted on a server forum looking for advice on how to deal with a major issue he encountered while trying to delete a few files. He had utilized what’s called the “rm-rf” command with undefined variables, which wound up destroying all data on the system. Like any good hosting provider, he had backups of the files, but, like a dumb-dumb, he had the backups stored on the system that he accidentally wiped. What a mess.

This is actually a similar blunder to one that Pixar experienced, almost deleting Toy Story 2 prior to its release.

As a result of Marsala’s negligence, all of the data that his company had stored was destroyed. This included the data of 1,535 customers, whom he had built and hosted websites for. Without any backups stored off-site, he had no way to recover the data.

As you might expect, the responses that Marsala received from other users of the online forum were quite negative. Many completely dismissed the possibility that his company could recover from such a devastating failure, and others questioned his abilities as a hosting provider. One poster even went as far as recommending that Marsala seek legal counsel, rather than attempt to restore the data, predicting that Marsala was “going out of business.”

The conclusion: Marsala’s best chance of recovering from this major blow was to recruit help from a third-party data recovery firm. Fortunately for him, the company was able to recover his files, but that doesn’t change the fact that his simple mistake was a huge hit to his company’s finances. The company suffered from fees associated with the disaster recovery process, as well as reduced income from the loss of business suffered as a result of his negligence.

The lesson: neglecting to follow best practices got Marsala in some hot water, and his failure basically invited disaster to his doorstep. Following the accepted best practices of data recovery could have easily prevented the situation from escalating as quickly as it did. In fact, Marsala’s reason for distress (user error) is one of the most common reasons to use a backup and disaster recovery solution, a solution that stores your backups off-site on a separate system.

Storing your data off-site allows your organization to avoid the many causes of data loss, including user error, fires, electrical surges, hardware failure, theft, and so much more. This minimizes the risk of these events threatening your business’s operations.

How do you manage your business’s data backups? Are they stored off-site, and do you have a system in place to rapidly deploy them in the event of a major disaster? If you’re uncertain, reach out to GTSS at (803) 298-3008.

0 Comments
Continue reading

Find Out What REALLY Happens When You Delete Your Data

b2ap3_thumbnail_lost_deleted_data_400.jpgYou understand that the Recycle Bin is the place where deleted files go, and you know that emptying the Recycle Bin is how you dispose of files that you no longer need. What you might not know is that emptying your Recycle Bin does not guarantee that your files are gone at all, and that they’re probably still available on your PC.

Tags:
0 Comments
Continue reading

What’s the Best Way to Store Your Company’s Data? Find Out!

b2ap3_thumbnail_how_are_you_storing_data_400.jpgMarch 31st is World Backup Day! This occasion begs the question, “How much thought have you put into where your data is stored?” If you haven’t thought through your data storage options, then your files may be located in several different places. This could make accessing your data difficult, as well as jeopardize your network’s security. To get you started, let’s take a look at these four data storage options.

0 Comments
Continue reading

4 Ways Cloud Computing Can Benefit Any Business

b2ap3_thumbnail_cloud_uses_400.jpgIs your business using the cloud in 2016? If not, you should know that it’s a great tool that’s designed to help your business better manage its data and application deployment. However, the cloud can be used for so much more, and it’s quickly becoming an indispensible tool for SMBs.

0 Comments
Continue reading

The Strict Security Measures of Nuclear Power Plants Can Benefit Your Business Too

b2ap3_thumbnail_backup_system_400.jpgTechnology, while a great asset that can be leveraged for your benefit, can also frighten businesses due to how unpredictable it can be at times. The constant threat of data loss, identity theft, and hardware failure can cripple your business’s ability to retain operations. Specifically, businesses can learn about risk management by analyzing the processes used by an industry where risk management is absolutely critical: nuclear power plants.

0 Comments
Continue reading

Business Continuity: Prepare For the Worst and Hope For the Best

b2ap3_thumbnail_business_continuity_400.jpgThere are few things more important than the continuity of your business. Your livelihood, and that of your employees, depends on the continued functionality of your organization. Therefore, it becomes necessary to do all that you can to ensure your business is protected from an unexpected downfall, due to data loss, natural disasters, and other means.

0 Comments
Continue reading

Disaster Recovery and Why it Matters to Southeast Businesses

When you mention the term 'disaster recovery,' most people think about the big ground-shattering events like earthquakes, fires, floods, tropical storms, etc. While these natural events are certainly disasters and devastating in their own right, smaller things can constitute as a disaster for your business, and they aren't seasonal.

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Hackers Microsoft Backup Google Software Business Computing Windows 10 Smartphones Business Malware Hardware Ransomware Network Security Hosted Solutions Productivity Email Computer Android Business Continuity Innovation Small Business Disaster Recovery Data VoIP User Tips Internet Efficiency Alert Windows Cybercrime Social Engineering Mobile Devices Data Backup Smartphone Telephone Systems Law Enforcement Upgrade Outsourced IT Network Operating System Managed IT Services Communications Quick Tips Chrome Money App Computers Cybersecurity Managed IT Services Browser Server Miscellaneous Social Media How To Virtualization Office Collaboration Office 365 Bring Your Own Device Spam Office Tips Remote Computing History Router Mobile Device Management Flexibility Windows 10 Data Recovery Passwords Business Management Communication Data Breach Cloud Computing Password Work/Life Balance Health Gadgets Automation Wi-Fi Google Drive Artificial Intelligence Safety Gmail Marketing Saving Money Facebook Phishing Spam Blocking Data Management Internet Exlporer Redundancy Bandwidth Avoiding Downtime Data Storage Private Cloud Hacking Workplace Tips Data storage Word Automobile IT Management Data Security Black Market Public Cloud Productivity Government Mobility OneNote Physical Security Recovery Best Practice Two-factor Authentication End of Support The Internet of Things Holiday IT Services Microsoft Office Unsupported Software Downtime Apps HaaS Frequently Asked Questions Workforce VPN Value Computer Fan Reputation Travel Software Tips Files Video Games Wearable Technology Robot Information Technology Start Menu Virtual Reality Knowledge Cast iPhone Trending Netflix Advertising Fraud Battery Wireless Technology Relocation Google Docs IT Support Risk Management Excel BDR Notifications Patch Management FENG Customers DDoS Content webinar BYOD Scalability USB Windows 10s Tools Worker Commute Network Congestion Managed Service Provider Comparison IT Support Sync Amazon Education Meetings Humor Website Cleaning Politics Laptop Tip of the week Telecommuting Save Money Search Scam Audiobook Conferencing Vulnerability IT Consultant Specifications Lithium-ion battery Amazon Web Services Computing Infrastructure Chromecast Voice over Internet Protocol Tech Support Keyboard Touchpad User Error Windows Server 2008 Remote Work YouTube How to Remote Monitoring Entertainment Emails Business Intelligence Instant Messaging Computer Care Solid State Drive Monitor Wireless Managed IT Leadership IT Plan Going Green HBO Settings Internet of Things Hybrid Cloud Telephony Online Shopping Applications Networking Data loss Shadow IT Legal Experience Windows 7 Identity Theft Update Techology Outlook Millennials Encryption Sports Samsung Audit Botnet Employer-Employee Relationship PDF Skype Evernote Users Current Events Screen Mirroring Apple Multi-Factor Security Mobile Device Music Internet exploMicrosoft Flash Credit Cards Root Cause Analysis NarrowBand Uninterrupted Power Supply Emergency Training Compliance Hiring/Firing Computer Accessories Smart Technology Public Computer Loyalty Vendor Management Regulation Bluetooth Thank You Two Factor Authentication SaaS Troubleshooting Charger Congratulations Transportation Big Data Worker Electronic Medical Records Benefits Assessment CrashOverride Webinar Books Rootkit Save Time IT solutions Firewall Television WiFi Employer Employee Relationship

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.