Overview

Backup Encryption Options Demystified

Backup Encryption overviewEncryption is everywhere:  On your storage, on your network, over the internet, and in the cloud. Encryption is about protecting your data from those who might otherwise use it to cause harm. It protects you from those who bypass security to access data within your organization, illegal access from outside, and provides protection for compliance. Your live data is the lifeblood of your organization and your backups protect your live data by letting you restore misplaced, damaged, stolen, or incorrectly edited data with versions that keep the business running. Continue reading

GDPR and Data Storage

Practical advice on GDPR compliant data storage

In a recent blog post, we reviewed the main terms and definitions in the upcoming General Data Protection Regulation (GDPR). For those of you who do not yet know about these new  EU compliance regulations, please refer to our GDPR Overview.

GDPR brings several major data management requirements  for all businesses that deal with data of EU citizens, including businesses that do not operate in the European Union, but process or store data of any person from the EU.

In today’s article, we will focus on GDPR compliant data storage. Continue reading

GDPR Overview: Key Terms and Regulation Summary

GDPR Overview: Terms, Definitions and Regulations

Businesses based in the European Union or businesses outside the EU working with EU citizen data are currently marking their calendars for May 25, 2018. That’s when GDPR is coming.

GDPR stands for General Data Protection Regulation and it’s a relatively new business data compliance regulation. It contains a whole range of new rules that companies may need to enact for proper compliance, as there are strict fines for non-compliance. Your business may be fined up to 4% of global annual turnover for your previous financial year or 20 million, depending on the larger amount.

You might think that US-based companies are not affected by these new regulations. But, you’d be wrong. If your company processes any EU citizen data, you need to be GDPR compliant.

In this article we will provide a general GDPR overview including main terms and regulations that you should be aware of.

Continue reading

Ransomware on Mac. Does it Exist?

One of the most annoying types of virus types nowadays, is Ransomware – malicious software that locks files or a computer until its owner pays a ransom for decryption. Windows users do a lot of things to protect their files, but how about for Macs? Should Mac users be worried about such virus types? In this article we are going to reveal the answer. Continue reading

Cloud Cost Management and Optimization with Monitoring Services

cloud account optimization with monitoring services header

Businesses across industries are increasingly moving toward the cloud. The simplicity and flexibility of configuring a virtual server room make it a no-brainer to incorporate services like Amazon S3 and EC2 into the companies’ IT infrastructure. But with major shifts, new challenges and vulnerabilities arise that need to be addressed. It is critical to ensure that security concerns are taken care of, and bills remain under control. With that in mind, let’s take a quick look at a few solutions that you can use for cloud cost optimization. Continue reading

Cloud Object Storage – Basics and Examples

Cloud Object Storage. Basics and Examples

Once you have used a cloud storage service, you are most likely going to be faced with its different types: block-, file- and object storage. These types determine how data is stored and used. We are going to explain in depth, one of the most commonly used storage types – object storage. Continue reading

What Is Block Storage?

What is block storage?

When most people hear “data storage,” they think about conventional file level storage. The storage solutions used by typical end users are file systems that are mapped to individual hard drives.

However, file systems are only one way to organize data. Another popular method -- and one that is particularly useful when setting up virtual machine storage, network attached storage and SAN storage -- is block storage.

This article defines block storage, discusses common block storage use cases and explains what makes block storage different from file level storage. Continue reading

Ransomware Is Even More Dangerous than You Think

How does ransomware works

How does ransomware work? If you think that ransomware works in the same way as other types of cyberattacks, you may be overlooking important steps for protecting yourself against it.

Ransomware works differently from other malware threats. Traditional security tools like antivirus scanners and firewalls are of limited use against ransomware. To combat ransomware effectively, you need to understand the complex nature of different types of ransomware attacks, then create processes -- such as strategic data backups -- to protect yourself against ransomware. Tools alone won’t keep you safe.

This article helps you defend yourself against ransomware by assessing the current state of ransomware threats and discussing the latest developments in ransomware design. Continue reading

Free Data Recovery Software

free data recovery software header

In a perfect world, you would have an automated data backup and recovery solution in place for all of your data so that you never need to worry about losing data.

In the real world, however, you may sometimes experience data loss without having a data backup in place. For example, you may have a disk drive that begins to fail and contains data that is not backed up, or you may accidentally delete files that have not yet been written to a backup location.

Fortunately, it is sometimes possible to recover data in situations like this. Several free data recovery software can help you to restore data even from disks that are damaged, or after you have erased data from your file system.

This article provides an overview of free data recovery tools and explains what each one can do to help you recover data after a data loss. Continue reading