We are network administrator colleagues. What did we struggle with when recruiting? On what values we have finally built up PATRON-IT s.r.o. company?
The customer is impatient, emails arrive late. We are still losing the fight with MS Office 365 support because we have failed to explain that the bug is at their side.
Once, we’ve got a “cool” idea of unifying antispam for all customers on Microsoft Office 365 Exchange Online Protection. It was supposed to be a simple task.
Few questions can make “IT guys” so furious. Is Hyper-V or VMware better? We chose Hyper-V and there are 6 reasons why Hyper-V is better for us.
Practical instructions for secure data backup. Technologies and practices, we trust. In the event of an attack, be assured that the backups will survive.
We often encounter inappropriately designed customer data backups. I’m happy to share with you how we are dealing with backing up the data.
Work reports were a small revolution for us. They have allowed us to get more money for the same job while having a more satisfied customer.
Broken server, encrypted data and backup as well. How to solve it? Is it worth to pay the ransom and get the data back?
We already know what is the IT problem and it’s not on our side. But how to explain it to Vodafone, get to a competent person and get help?
How I began to fulfill my dreams of traveling and spent most of my time of the last year abroad. Tips for digital nomadism.
Unsolvable Vodafone. One day we faced a strange IT problem. We did not know how to explain it to anyone, let alone solve it.
We have participated in the ESET Partners Meeting 2017 (SEP), which took place at Mácha’s Lake. In general, I am skeptical about these meetings.
Ransomware: A story of hackers hacking the server and the company losing all data. We’ve uncovered the penetration and retrieved data.
What are the benefits of IT standardization for customers and for us? We have reduced the number of network failures due to standardization.
I’ve reviewed the worst case scenario that can possible happen in the network. The fundamental question in IT security sounds – will your backups survive?