February Maintenance Week 2022

Throughout the week of February 7th 2022, we will be performing maintenance on DataYard’s infrastructure and customer servers. This will include performing updates to all managed server infrastructure, including tasks that require reboots/shutdowns/service interruptions.  Maintenance will begin at 12:00AM EST and will be completed by 8:00AM EST throughout various days this week. Making IT Better! […]

January Maintenance Week 2022

Throughout the week of January 10th 2021, we will be performing maintenance on DataYard’s infrastructure and customer servers. This will include performing updates to all managed server infrastructure, including tasks that require reboots/shutdowns/service interruptions.  Maintenance will begin at 12:00AM EST and will be completed by 8:00AM EST throughout various days this week. Making IT Better! […]

December Maintenance Week 2021

Throughout the week of December 13th 2021, we will be performing maintenance on DataYard’s infrastructure and customer servers. This will include performing updates to all managed server infrastructure, including tasks that require reboots/shutdowns/service interruptions.  Maintenance will begin at 12:00AM EST and will be completed by 8:00AM EST throughout various days this week. Making IT Better! […]

MS Exchange Critical Security Threat – We’ve Got Your Back!

You may have heard rumblings across the Internet of a giant Microsoft Exchange vulnerability that raised its ugly head this week.  On Tuesday evening, Microsoft announced the existence of four critical zero-day security vulnerabilities affecting all current versions of Microsoft Exchange Server.  That’s the same time we stepped up to make sure that all DataYard […]

The Difference of Dedicated Hosting

If you’ve done any looking into hosting services, you’ve likely realized how many options there are out there. Prices and features range drastically from one service to the next. But what does it all mean? How can some hosting services cost so much more than others?

HIPAA Compliance for Hosting and Data Security

If you work anywhere in the healthcare space, you’re probably very familiar with HIPAA compliance. Passed in 1996, the Health Insurance Portability and Accountability Act provides rules and guidelines for healthcare access, health information storage, health insurance, and more. HIPAA consists of five primary parts or titles: HIPAA Title I – Health care access, portability and renewability, HIPAA Title II – Preventing health care fraud and abuse; […]

DataYard – At Your Service

DataYard – At Your Service! Now available by popular demand, DataYard has created a brand new offering under a brand new division, At Your Service.  AYS will help regional companies with all aspects of business IT – whether it is managing existing workstations and servers, migrating to a VoIP phone service, upgrading network equipment, or guiding your transition to […]

DataYard’s 2016 Internship Program – Internet of Things Kick-Off!

On June 1st DataYard officially brought on two new summer interns for a specific and pretty cool project – to explore the Internet of Things (IoT)! The chosen ones – Owen Devine and James Kinion – will be working with us through August to design, build, and deploy mobile units which report not only their […]

Client Spotlight – Mikesell’s Project Overview

DataYard is proud to announce our latest partnership with the Mikesell’s Snack Food Company – the oldest potato chip company in the United States! Since 1910, Mikesell’s has been manufacturing and shipping delicious treats from right here in Dayton to the surrounding tri-state. DataYard and Mikesell’s were introduced via mutual partners and Technology First relationships, […]

Linux Exploit Liability? Backspace 28 times to get in…Really?

Linux Exploit Liability? Backspace 28 times to get in…Really? Recent headlines on a new Linux exploit have been spectacular: How to hack any Linux machine just using backspace Exploit Logs You Into Linux Systems After Hitting Backspace 28 Times Log into most any Linux system by hitting backspace 28 times The vulnerability lies within the […]