GTSS Blog

GTS Solutions has been serving the Chapin area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Have a Data Backup In Place?

Do You Have a Data Backup In Place?

Take a moment to imagine the absolute worst disaster scenario for your business. Does it involve a catastrophic event destroying your office building? Does it include key staff being absent from the office for extended periods of time? Does it include your business suffering from data loss or security breaches?

0 Comments
Continue reading

Prepping For A Weather Event Needs To Happen In Your Business

Prepping For A Weather Event Needs To Happen In Your Business

Running a business requires the ability to stay in control, especially when others couldn’t. However, there are some situations--like major weather events--that simply will not be controlled. In cases like these, you need to make sure your business is prepared to withstand the worst. A business continuity plan can help you do so.

0 Comments
Continue reading

Save Considerable Time By Automating Your Data Backup Process

Save Considerable Time By Automating Your Data Backup Process

Is your organization still relying on antiquated tape backup to keep your data safe? A more reliable, less time-consuming alternative known as image-based, or “snapshot” backup, could change the way that you look at disaster recovery. In fact, image-based backup has the potential to optimize your business’s data continuity.

0 Comments
Continue reading

Do Memes Have a Place in the Professional Business Environment?

Do Memes Have a Place in the Professional Business Environment?

Whether we like it or not, memes have had a profound effect on how the world’s population views current events and popular culture. In part, this is thanks to the prevalence of the Internet, which has fostered these absurd images and provided them an outlet to flourish. Due to how viral they are, it would be foolish to dismiss them as inconsequential; in fact, when leveraged properly, memes can make a statement about your business and its specific brand.

0 Comments
Continue reading

Study: 95% of All Cyber Attacks are Financially Motivated

Study: 95% of All Cyber Attacks are Financially Motivated

Businesses need to take security into account and make it a priority. In fact, security is so important that Verizon has compiled a report of the various types of attacks and data breaches that occurred in the past year. This is Verizon’s Data Breach Investigations Report, or DBIR, and it offers insights into how you can protect your business and secure your assets.

0 Comments
Continue reading

How NOT to Maintain a Backup

How NOT to Maintain a Backup

A data loss incident is considered a major disaster scenario, especially for small and medium-sized businesses. All it takes is one moment to lose your business’s entire data infrastructure. We’ll walk you through a story that should serve as a cautionary tale, one that hopefully teaches you to adhere to data backup and disaster recovery best practices.


Marco Marsala, a hosting provider, posted on a server forum looking for advice on how to deal with a major issue he encountered while trying to delete a few files. He had utilized what’s called the “rm-rf” command with undefined variables, which wound up destroying all data on the system. Like any good hosting provider, he had backups of the files, but, like a dumb-dumb, he had the backups stored on the system that he accidentally wiped. What a mess.

This is actually a similar blunder to one that Pixar experienced, almost deleting Toy Story 2 prior to its release.

As a result of Marsala’s negligence, all of the data that his company had stored was destroyed. This included the data of 1,535 customers, whom he had built and hosted websites for. Without any backups stored off-site, he had no way to recover the data.

As you might expect, the responses that Marsala received from other users of the online forum were quite negative. Many completely dismissed the possibility that his company could recover from such a devastating failure, and others questioned his abilities as a hosting provider. One poster even went as far as recommending that Marsala seek legal counsel, rather than attempt to restore the data, predicting that Marsala was “going out of business.”

The conclusion: Marsala’s best chance of recovering from this major blow was to recruit help from a third-party data recovery firm. Fortunately for him, the company was able to recover his files, but that doesn’t change the fact that his simple mistake was a huge hit to his company’s finances. The company suffered from fees associated with the disaster recovery process, as well as reduced income from the loss of business suffered as a result of his negligence.

The lesson: neglecting to follow best practices got Marsala in some hot water, and his failure basically invited disaster to his doorstep. Following the accepted best practices of data recovery could have easily prevented the situation from escalating as quickly as it did. In fact, Marsala’s reason for distress (user error) is one of the most common reasons to use a backup and disaster recovery solution, a solution that stores your backups off-site on a separate system.

Storing your data off-site allows your organization to avoid the many causes of data loss, including user error, fires, electrical surges, hardware failure, theft, and so much more. This minimizes the risk of these events threatening your business’s operations.

How do you manage your business’s data backups? Are they stored off-site, and do you have a system in place to rapidly deploy them in the event of a major disaster? If you’re uncertain, reach out to GTSS at (803) 298-3008.

0 Comments
Continue reading

Business Continuity: Prepare For the Worst and Hope For the Best

b2ap3_thumbnail_business_continuity_400.jpgThere are few things more important than the continuity of your business. Your livelihood, and that of your employees, depends on the continued functionality of your organization. Therefore, it becomes necessary to do all that you can to ensure your business is protected from an unexpected downfall, due to data loss, natural disasters, and other means.

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Privacy Best Practices Technology Cloud Hackers Microsoft Backup Google Software Business Computing Windows 10 Smartphones Business Malware Hosted Solutions Productivity Ransomware Hardware Network Security Business Continuity Innovation Small Business Disaster Recovery Android Email Computer VoIP Data User Tips Internet Efficiency Alert Cybercrime Mobile Devices Smartphone Telephone Systems Upgrade Law Enforcement Data Backup Social Engineering Windows How To Quick Tips Browser Collaboration Outsourced IT Money Computers Communications Managed IT Services Chrome Virtualization App Server Cybersecurity Managed IT Services Network Operating System Miscellaneous Social Media Office Artificial Intelligence Passwords History Router Mobile Device Management Office 365 Spam Gadgets Business Management Flexibility Health Windows 10 Data Breach Google Drive Automation Cloud Computing Password Data Recovery Office Tips Remote Computing Work/Life Balance Safety Communication Wi-Fi Bring Your Own Device Microsoft Office IT Services Two-factor Authentication Apps Phishing HaaS Facebook Spam Blocking Private Cloud Hacking Recovery Data storage Best Practice Data Storage Government Black Market Public Cloud Physical Security Redundancy IT Management Avoiding Downtime Gmail The Internet of Things Automobile Saving Money Workplace Tips End of Support Internet Exlporer Productivity Data Management Mobility OneNote Downtime Bandwidth Data Security Word Marketing Unsupported Software Holiday Current Events Screen Mirroring HBO Business Intelligence Save Money Wireless Technology Relocation Managed IT Advertising Lithium-ion battery Users Customers Telephony Online Shopping Mobile Device Music Root Cause Analysis Software Tips Windows 7 Identity Theft Managed Service Provider Value Computer Fan Update Tech Support Knowledge Cast Outlook Millennials YouTube Humor Botnet Multi-Factor Security Virtual Reality Netflix Skype Evernote Video Games Laptop Wearable Technology Shadow IT Battery webinar BYOD Flash Credit Cards IT Support Risk Management FENG Network Congestion Frequently Asked Questions Workforce Chromecast Content Windows 10s Travel Patch Management Meetings Trending Encryption Sports Worker Commute IT Support Start Menu Scalability Touchpad USB User Error Education Monitor Wireless Conferencing Fraud Going Green Politics Google Docs Hybrid Cloud IT Consultant Excel BDR Audiobook Vulnerability Uninterrupted Power Supply Search Internet of Things Scam Comparison VPN Tools Website Computing Infrastructure Emails Sync Amazon Keyboard PDF Leadership IT Plan Tip of the week Telecommuting Entertainment Apple Computer Care Solid State Drive How to Networking Data loss Specifications Notifications NarrowBand Settings DDoS Instant Messaging Internet exploMicrosoft Voice over Internet Protocol Applications Reputation Amazon Web Services Legal Experience Files Robot Information Technology Employer-Employee Relationship Windows Server 2008 Remote Work Techology iPhone Samsung Audit Remote Monitoring Cleaning Rootkit Books Save Time Employer Employee Relationship IT solutions Television Firewall Congratulations Training Emergency Hiring/Firing Computer Accessories Public Computer Smart Technology Loyalty WiFi Vendor Management Bluetooth Compliance Two Factor Authentication SaaS Charger Regulation Troubleshooting Transportation Worker Big Data Electronic Medical Records Webinar Assessment CrashOverride Benefits Thank You

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.