Please enable JavaScript.
Coggle requires JavaScript to display documents.
Netwise Resources Content Map (Months 2-6 | Data Backup & Disaster…
Netwise Resources
Content Map
Month 1
| SEO Optimization
Months 2-6 |
Data Backup &
Disaster Recovery
Month 4
| Data Backup (Management)
.
Email 2
| WP
Newsletter
Email 1
| Cornerstone 1
WP |
[Guide] How to test data backup integrity
Blog 2 |
[Knowledge] 2018 data backup trend review
Blog 1 |
[Guide] What is the 3-2-1 backup rule?
Month 3
| Data Backup (Resources)
.
Email 2
| WP
Newsletter
Email 1
| Blog 1
Blog 1 |
[Guide] What are your data backup software options?
WP |
[Guide] X cloud backup security tips
Blog 2 |
[Knowledge] The top X benefits of cloud data backups
Cornerstone #1
| The complete guide to data backup for SMBs
Month 5
| Disaster Recovery (Design)
.
Email 2
| WP
Newsletter
Email 1
| Blog 1
Blog 2 |
[Knowledge] You need to know these X DR terms
Blog 1 |
[Guide] X things to include in a BDR plan
WP |
[Knowledge] X types of disaster recovery plans to consider
Month 2
| Data Backup (Strategy)
.
Email 2
| WP
Newsletter
Email 1
| Blog 1
Blog 1
| [Checklist] X things to include in a backup strategy
Blog 2 |
[Knowledge] How RTO and RPO shape your backups
WP |
[Knowledge] What should your business be backing up?
Month 6
| Disaster Recovery (Recovery)
.
Email 2
| WP
Newsletter
Email 1
| Cornerstone 1
Blog 2 |
[Guide] X key steps to establishing roles in a disaster
Blog 1 |
[Guide] A step-by-step guide to prioritizing disaster recovery assets
WP |
[Guide] How to conduct a BDR test
Months 7-9 |
Managed Security
Month 8
| Managed Security (Software)
.
Email 2
| WP
Newsletter
Email 1
| Blog 1
WP |
[Guide] Everything you need to know about patching
Blog 2 |
[Guide] Data encryption: a step-by-step guide
Blog 1 |
[Checklist] X things a good antivirus must do
Cornerstone #2 |
Business cybersecurity 101
Month 9
| Managed Security
(Employee Training)
.
Email 2
| WP
Newsletter
Email 1
| Cornerstone 2
Blog 2 |
[Guide] The quick guide to beating social engineering
Blog 1 |
[Guide] How to keep mobile data secure
WP |
[Guide] How to navigate the web safely
Month 7
| Managed Security (Hardware )
.
Email 2
| WP
Newsletter
Email 1
| Blog 1
Blog 1 |
[Knowledge] X reasons you need a good firewall
WP |
[Guide] How to choose secure IT hardware
Blog 2 |
[Guide] Cheap vs. expensive security hardware
Months 10-12 |
Managed Security
Month 11
| Managed Services
(Tech Support Evolution)
.
Email 2
| WP
Newsletter
Email 1
| Blog 1
WP |
[Knowledge] Assessing the need for managed services
Blog 2 |
[Knowledge] Are you proactive, or are you break-fix?
Blog 1 |
[Checklist] X signs it’s time to ditch the “IT guy”
Cornerstone #3 |
Grow your technology alongside your business
Month 12
| Managed Services
(Tech Strategy)
.
Email 2
| WP
Newsletter
Email 1
| Cornerstone 3
Blog 2 |
[Guide] How to create a lasting IT strategy
WP |
[Guide] How to identify and handle IT bottlenecks
Blog 1 |
[Checklist] X critical steps in building an IT budget
Month 10
| Managed Services
(Tech Improvements)
.
Email 2
| WP
Newsletter
Email 1
| Blog 1
Blog 1 |
[Checklist] Slow Wi-Fi? Here are X things to try
WP |
[Guide] How to boost productivity with technology
Blog 2 |
[Guide] How to speed up your PC