Ransomware Protection in CloudBerry Backup 5.8

Ransomware has been a growing problem for businesses and consumers this past year. Ransomware attacks disrupt normal business continuity by encrypting important business documents (or personal files like pictures, video, and documents) and demanding ransom to recover the data. You either recover by paying the ransom or manually restoring backups, if you have them. To help protect customer backups, we implemented ransomware protection functionality in CloudBerry Backup 5.8.

Continue reading

Disk Capacity Dashboard in CloudBerry Backup 5.8

CloudBerry Backup 5.8 now includes the ability to graphically visualize the size of your local disks. The new Disk Capacity dashboard displays folders and folder sizes and facilitates the analysis of disk utilization and how those folders might affect overall backup storage. Read on to learn more about the feature.

Continue reading

Two Step Protection against Data Breach

Two Step Protection Against Data Breach

By using cloud storage, in today’s world, we need to make additional efforts in keeping the data protected. If you create a cloud-based folder with the same sharing practices, hackers and industrial spies can access it, even if you do not show the URL on the Internet.

In this article, you will learn about some recent data leaks and how to keep your sensitive data safe by implementing encryption and IAM policy best practices.
Continue reading

Ransomware Is Even More Dangerous than You Think

How does ransomware works

How does ransomware work? If you think that ransomware works in the same way as other types of cyberattacks, you may be overlooking important steps for protecting yourself against it.

Ransomware works differently from other malware threats. Traditional security tools like antivirus scanners and firewalls are of limited use against ransomware. To combat ransomware effectively, you need to understand the complex nature of different types of ransomware attacks, then create processes -- such as strategic data backups -- to protect yourself against ransomware. Tools alone won’t keep you safe.

This article helps you defend yourself against ransomware by assessing the current state of ransomware threats and discussing the latest developments in ransomware design. Continue reading

4 Ways to Protect Against Ransomware with Backups

4 ways to protect against ransomware with backups

In our last article, we described the recent situation with many organizations were hit by the WannaCry strain of ransomware – and the possible ways of retaliation. In some cases, organizations simply chose to pay the ransom of $300 – a mere pittance compared to the value of lost data. But WannaCry was not ransomware targeting businesses; instead, it was focused on impacting individuals. Thus, the extremely low ransom.  In many ways, organizations hit by WannaCry were lucky.

But the next ransomware variant may not be so nice.

Continue reading

Free Data Recovery Software

free data recovery software header

In a perfect world, you would have an automated data backup and recovery solution in place for all of your data so that you never need to worry about losing data.

In the real world, however, you may sometimes experience data loss without having a data backup in place. For example, you may have a disk drive that begins to fail and contains data that is not backed up, or you may accidentally delete files that have not yet been written to a backup location.

Fortunately, it is sometimes possible to recover data in situations like this. Several free data recovery software can help you to restore data even from disks that are damaged, or after you have erased data from your file system.

This article provides an overview of free data recovery tools and explains what each one can do to help you recover data after a data loss. Continue reading

Sneak peek of Grandfather-Father-Son backup in CloudBerry Backup

Designing a comprehensive backup strategy is a task of utmost importance for any organization. In considering various aspects of this strategy, perhaps the most important objective is to strike a balance between a sensible retention policy and manageable storage fees. Traditional retention policies that work off file versions can quickly become too costly for long-term storage. Thus, a more cost-effective retention design and solution is required.

Continue reading

Tips from Steve: Real Life Disaster Recovery Scenarios

What would you do if a disaster strikes? Flood, fire, tornado, a devastating ransomware attack. These all are real-life issues, that any business can face. We have asked Steve Putnam to tell us about the real-life disaster recovery examples, they have in mind, for the possible disaster striking one of their clients. Continue reading

Recovery Time Objective (RTO) Explained

Recovery time objective (RTO) explained

The main aspect of every backup and recovery strategy is a balance of RTO and RPO objectives. They regard how quickly and precisely you will be able to get the data back if something goes wrong. In case of disaster, recovery time objective becomes one of the most valuable characteristics in the business planning.
Continue reading