marketing@abtechtechnologies.com

6 common items that help identify a phishing attempt

What is Phishing? Phishing is a cybercrime in which a target or targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.  Generally, emails sent as phishing attempts are masked …

6 common items that help identify a phishing attempt Read More »

Abtech’s team of talented support engineers continues to grow.

Zach Taggett has joined Abtech Technologies as part our team of talented support engineers in our managed IT services division. Abtech is expanding its managed services division in Maryland, Washington D.C., Delaware and Virginia. Zach brings with him many years of experience, supporting customer IT environments, and came to us highly recommended by one of our …

Abtech’s team of talented support engineers continues to grow. Read More »

Swimming to the top in a sea of server offerings

Evaluating server suppliers can be tough. In considering the Big Four, with similar options from the same chip manufacturers, NICs from the same networking vendors, and the same OEM’s disk and memory options, it can be difficult to look at servers as anything but a commodity. On the other hand, each server supplier has their …

Swimming to the top in a sea of server offerings Read More »

Top 10 Reasons to Refresh legacy DellEMC storage with PowerStore

As they say, all good things must come to an end.  Storage administrators with expiring DellEMC storage solutions know this better than anyone. Acquired by Dell in 2010, Compellent, later dubbed as SC, featured Auto-Tiering which proved as a nifty way to keep the most frequently accessed data on flash media, and tier less frequently …

Top 10 Reasons to Refresh legacy DellEMC storage with PowerStore Read More »

‘killware’ Raises the Stakes in the Game of Cyber Security.

As Business Leaders and IT Professionals continue efforts to get off their heels and in front of cyber criminals, the threats are changing and making it more important than ever to protect our most valuable commodity – data. While ransom events like Colonial Pipeline and Solar Winds certainly grabbed national attention, bad actors continue to quietly evolve their efforts.  …

‘killware’ Raises the Stakes in the Game of Cyber Security. Read More »

Abtech Technologies awarded multi-year managed services contract.

Abtech Technologies has been awarded a multi-year contract to provide and deliver IT Managed Services, IT Security Services and IT Consulting Projects for the City of Lake Forest, CA. This is in addition to the Cloud Backup and Disaster Recovery Service that Abtech Technologies already provides for the city. Abtech won the bid against strong …

Abtech Technologies awarded multi-year managed services contract. Read More »

Microsoft Teams Best Features

Microsoft Teams™ is a real-time, cloud-based platform that provides users with workplace chat, video and audio meetings, file collaboration capabilities, file storage, and so much more. In this newsletter, you will gain valuable insights into how you can use Microsoft Teams wide array of features to your advantage. Here are just some of the highlights: …

Microsoft Teams Best Features Read More »

Why move to the Dell|EMC VxRail for your next upgrade?

HYPERCONVERGED. One of the many buzzwords thrown around today amongst the litany in the IT industry. What is Hyperconverged and how can it help revolutionize your daily business operations? Many years ago, the need for more and more applications caused data centers to grow, so did the need for additional servers.  Servers were standalone, single …

Why move to the Dell|EMC VxRail for your next upgrade? Read More »

“How To Get The Best Performance From Your SQL Server 2019”

Contrary to common perception, today’s Microsoft SQL Server is no longer an off the shelf RDBMS system that you install and run with its default settings.    With version 2019 you get one of the most sophisticated and technologically advanced systems on the market comparable to the likes of Oracle.   To help the average user, we …

“How To Get The Best Performance From Your SQL Server 2019” Read More »

How Protected Are Your Backups Against Ransomware?

Ransomware today is big business for criminals, so profitable that we are seeing more organized crime and nation-state actors getting involved. The threat landscape today is larger than ever with supply chain attacks targeting major vendors and pushing compromised software updates as seen in the 2021 SolarWinds incident or shipping conglomerate Maersk in 2017. Each …

How Protected Are Your Backups Against Ransomware? Read More »

Archive, Backup, and Disaster Recovery

Backing up, archiving, and preparing for disaster recovery are obviously related. They overlap, but each one names a different purpose. Doing a good job at one of them doesn’t mean they’re all covered. Let’s consider what each one involves. Backup The purpose of a backup is to restore files that are lost or damaged. Recovery …

Archive, Backup, and Disaster Recovery Read More »

What to do when EMC announces that your storage array is “end of support.”

EMC, like many hardware manufacturers, would much rather you replace your old storage array with a shiny new one.  To encourage you to do this, they gradually end support on other products.  Currently their Clariion range is the target for this process. Anyone with a CX3, CX300, CX4 or CX400 series Clariion array should take …

What to do when EMC announces that your storage array is “end of support.” Read More »

Backup and Replication – Why Replication Isn’t Enough

We frequently talk to customers about their backup and disaster recovery plans. A topic that often comes up is that the customer feels they are covered by their replication of data and don’t need to have a separate backup schema. Let’s analyze that: The replication system will typically create a real time copy of the …

Backup and Replication – Why Replication Isn’t Enough Read More »