The Jungle Disk Blog

Featured Post

Top Five Most Popular Jungle Disk Blog Posts of 2016

by Christina Weaver - Dec 30, 2016

Jungle Disk CEO on Small Business Advocate with Jim Blasingame

Small Business Security Interview & Denial of Service Attacks Explained This morning, Bret Piatt, Jungle Disk’s CEO aka King Biscuit, was on the Small Business Advocate show with Jim Blasingame to discuss cybersecurity tips for small business...

by Christina Weaver / Thought Leadership, Industry News, Business Strategy / Oct 25, 2016

How to Prevent Malicious Bots and Worms from Network Scanning - Implement a Layered Security Approach

Network scanning is the use of computers or other devices to gather information in order to compromise your network. Your business’ network is likely being scanned by internet worms and bots over 100 times a day. These bots and worms scan your net...

by Trey Fischer / Product, Network Threat Protection, Ransomware / Oct 24, 2016

Behind the Scenes at Jungle Disk - Eat Your Own Dog Food

I would like to take some time to tell you a quick story on how I literally “ate our own dog food” a few weeks ago when running into some issues recovering an important Excel file. Quick hint, Jungle Disk came to the rescue! Here’s the Story I w...

by Huw Edwards / Behind the Scenes, Product, Business Strategy / Oct 21, 2016

Configurable Retention and How it Can Help Meet Your Business Needs

Today, I would like to give you some tips on configurable retention and how Jungle Disk is able to retain your business’ data based on settings provided in our backup software. Additionally, I would like to go over some benefits of retention and h...

by Jordan Iriarte / Product, Encrypted Backup / Oct 20, 2016

Protect Your Network Gateway and Business Critical Data from Cyber Thieves

Ransomware is up 35 percent in 2015 according to Symantec. In case you are not familiar, ransomware is when cyber criminals hold digital data hostage by encrypting it and only releasing the data if the victim of the attack pays the ransom fee. Onc...

by Del Peñano / Product, Network Threat Protection, Ransomware / Oct 19, 2016

Internet of Things aka IoT Security - Cyber Talk Radio Episode 4

Internet of Things Security - Week 4 of Cyber Talk Radio Listen to the replay: IoT Security with John Engates, CTO of Rackspace Show Summary This past Saturday, October 15, the fourth episode of Cyber Talk Radio hit the airwaves on 1200 WOAI ...

by Bret Piatt / Cyber Talk Radio, Thought Leadership / Oct 18, 2016

Behind the Scenes - How Jungle Disk Uses Continuous Integration Software and Slack to Speed Development Cycles

When you think about Jungle Disk as a software company, you likely think of our backup application software that you install directly onto a computer or server. While this application is at the core of our business, there is a whole world of appli...

by Wes Dunn / Behind the Scenes, Product, Technical / Oct 17, 2016