Team Member Spotlight

We know every team member offers a unique skillset to help our clients at every step of the way, and we’re proud of it. Meet Joe Thomas, External Operations Leader.
ChannelE2E MSP

Stronghold Data Named to ChannelE2E Top 100 Vertical Market MSPs: 2021 Edition

Stronghold Data has been named to After Nines Inc.’s ChannelE2E Top 100 Vertical Market MSPs list and research for 2021.
CRN Head Photo

Stronghold Data Recognized as a CRN Managed Security Provider 500

Stronghold Data, a leader in IT services and cyber security, announced today that CRN, a brand of The Channel Company, has named Stronghold Data to its 2021 Managed Service Provider (MSP) 500 list in the Security 100.
Stronghold Acquisition

Stronghold Data Joins Best in Class Managed Service Provider, New Charter Technologies

New Charter Technologies, a portfolio company of Palo Alto-based private equity firm Oval Partners, announced the acquisition of Stronghold Data, the leading IT services provider spanning across MO, KS, OK, and AR.
3D illustration open trash button yellow files deleted data

Is deleted data ever completed erased?

Being a business leader means that you have to consider how to keep your company’s data secure from loss and data breaches. Keeping data safe doesn’t end when you hit “delete”. It’s vital to know what happens and how to truly wipe data to keep your business and your clients safe.
data management

What happens to your data when you die?

Your digital life is only taking on a larger footprint as we embrace the cloud. And while it’s not a fun topic to discuss, it is important to consider what will happen to your data after you die. Here are some of the different types of data you need to consider.
Data loss symbolized by a rack of hard drives being removed from a blade chassis.

4 real-life examples of data loss

Data loss can affect your business when you least expect it. It can be caused by equipment failure, hacking, or even employee error. These real-life examples of data loss illustrate why it is so important to have multiple data backups and a plan for data restoration.
data breach computer motherboard

What we learned from the top data breaches of 2018

Facebook, MyHeritage, Quora, Under Armour, Starwood-Marriott. Each of these companies was breached, but in a different way and with different damage. We have compiled a rundown of these breaches along with our takeaway, so that you can learn from their mistakes.
data storage limitless data retention policy

Why you need a data retention policy

As data storage options have exploded, storage capacities seem limitless. But just because you can keep all your data, doesn’t mean you should. We talked with information governance lawyer Peter Sloan with the Information Governance Group about data security and why you need a data retention policy.
team of employees responding to a cybersecurity incident

How to respond when your business encounters a cybersecurity incident

You’ve discovered an anomaly in your network. Maybe your electricity usage has spiked or an employee fell for a phishing scam. What is the first thing you should do? We talked with incident response expert Peter Enko about the key steps to take after a cybersecurity incident.