This is just a very quick post/compilation of what our customers have been saying about us on the web.
If you're one of them, thank you very much!
If you live in Drumheller or the surrounding areas, you have probably noticed your lights dimming, flickering, or even going out. Some of you may even have lost power entirely.
These issues are not just an inconvenience, they are a risk. Your favourite gadgets are packed full of very sensitive electronics that do not respond well to large changes in voltage.
We’re pleased to announce that our Reality Bytes Managed Online Backup will be updated to version 15.10 and will be released as part of the new Reality Bytes MSP Agent update. This update includes many new features, customer enhancements, bug fixes, usability updates and performance improvements.Here is an introduction to some of the exciting new features you’ll see:Backup Accelerator:
If you are protecting environments with large files, databases, virtual machines or applications then Backup Accelerator can improve your Recovery Point Objective (RPO) by significantly reducing the pre-backup processing for these large files, reducing the ongoing backup window by as much as 90%.
Mere days after a report was published detailing the profits that the perpetrators of Cryptowall made with their ransomware ($325 million, for the curious), new reports have began to crop up across the internet of the next evolution of the notorious malware.
Using the same methods of infection as the previous Cryptowall 3, the ransomware arrives in a .zip file attached to an email, claiming to be a resume.
The Reality Bytes Managed Antivirus PRO is now powered by Bitdefender, which combines best-in-class protection against malware and viruses with excellent performance in minimizing false positives and low system overhead so you have robust, reliable protection with the lowest possible performance degradation.
We can configure every aspect of the Reality Bytes Managed Antivirus agent including scan schedules, remediation action (i.e. what to do if a threat is discovered) and file and folder exclusions.