42% of used drives sold online are holding sensitive data
Over the years, we have written tiresomely about why it is so important to ensure your sensitive data doesn't get into the wrong hands. From ensuring that second-hand resellers are deleting your data...
New Study: Data Deletion Methods Are Not All Equal
Not all attempts at data deletion are successful. We recently released a study with our trusted erasure software partner Blancco Technology Group where we purchased 122 pieces of second-hand...
Make it big! Recovery solutions for large storage systems (Part2)
In the first part of this article we covered the storage systems architectures, now we want do give some insights on how to cope with system failures and data loss: Avoiding storage system failures...
Lost in the Cloud: Steps to Protect Your Cloud Data
On any given day, most of us rely on the cloud to store, upload, and retrieve various types of data – work files, songs, pictures, videos, apps, etc. It’s a proven, reliable service that we’ve grown...
Are your Android apps putting your phone at risk?
If you own an Android, you’re probably a regular visitor to the Google Play Store. Having the latest gaming app, or an app to tell you how many reps you’ve done at the gym is part and parcel of...
Writing a disaster recovery plan for your small business [free template]
The practice of preparing for downtime, and of taking steps to ensure a speedy return to normality, is called disaster recovery (DR) planning. Unfortunately, it’s not always a walk in the park to...