/home/gpbackups/public_html/wp-content/themes/gpb_wp/header.php
/home/gpbackups/public_html/wp-content/themes/gpb_wp/menu.php
/home/gpbackups/public_html/wp-content/themes/gpb_wp/taxonomy.php

To ensure that your computer systems operate optimally, securely and reliably without being a contributor to people and process inefficiency, there are a set of principles that your organization should follow.

Power Stability

A Continuous and Stable Supply of power is a requirement for Computer Systems to operate reliably. A system that is powered by an unreliable power source will have a shorter life span due to the stresses placed upon the internal power supply.

Although a laptop may have a large run-time on its batteries, what happens to your internet connection when the Eskom Power goes down. Do you have an Uninterruptible power source that will provide power to your equipment during an Eskom Power outage, enabling your operations to continue optimally?

GPBackups works with various System Vendors to ensure our clients use the most appropriate Power Systems

To ensure that your computer systems operate optimally, securely and reliably without being a contributor to people and process inefficiency, there are a set of principles that your organization should follow.

Internet Service

How reliable is your Internet link and is it optimised for your application usage profile. With Cloud based applications, the stability and reliability of your Internet link becomes a crucial component in your IT infrastructure.
When engaging a new client, one of the checks that GPBackups performs is the suitability of the client Internet Link.

In some cases, we will advise a prospective client to change their Internet Service Type to ensure optimal performance for their usage profile.

GPBackups works with various Internet Service Providers, to ensure that our clients have the most appropriate Internet Service

To ensure that your computer systems operate optimally, securely and reliably without being a contributor to people and process inefficiency, there are a set of principles that your organization should follow.

USB Sticks

The usage of USB sticks has made it very easy to move/copy data from one machine to another. However the following risks are introduced through the usage of USB Sticks.

The usage of memory sticks should be minimised to essential usage only. Not private data or entertainment files should be transferred via Memory sticks, as this increases the probability of a virus or vulnerability being spread in an organisation