24 January 2017 by Michael Nuncic
Data encryption: what methods are used and how to “crack” them
20 January 2017 by Matt Prince
In this post we’ll analyse why it’s necessary to properly erase data in virtual systems and what legislation is in place to support this.
17 January 2017 by Kathrin Brekle
Find out how a ransomware attack is usually carried out by criminals to encrypt data and demand money from both individuals and companies alike.
13 January 2017 by Mikey Anderson
DIY data recovery can cause more damage. In this blog, we share some tips on what to do (and not do) when you suspect you’ve lost data.
05 January 2017 by Michael Nuncic
Lost data from multi-layered systems make for some of the most complex recoveries, however it is possible to get the data back… with the right skills.
03 January 2017 by Michael Nuncic
In 2017 we predict the rise of flash, hyper-converged storage and ransomware will lead to further data encryption and stronger information security in companies.
29 December 2016 by Mikey Anderson
Here are 5 songs that perfectly describe a busy day in IT and will help to keep you motivated throughout the festive period.
23 December 2016 by Mikey Anderson
Find out how to optimise smartphone performance, increase battery life and overcome common problems.
13 December 2016 by Michael Nuncic
Find out the top 6 things to do (or not) before and after you suffer a data loss in a RAID-based storage array for the best chance of getting your data back.
09 December 2016 by Milagros Gamero
The GDPR is imminent and, though we will no longer be a part of the EU, we must still comply with this regulation if we are to work with European countries.
06 December 2016 by Michael Nuncic
In this article find out how to protect your digital data and privacy from cyber criminals with 6 easy steps.
02 December 2016 by Michael Nuncic
Learn what happened when a large German hospital suffered a crippling ransomware attack to their Dell EqualLogic PS6500ES storage array.
18 November 2016 by Massimo Mazza
Find out more about how a smart home works, how much it costs and what the associated security risks are with connected devices.
11 November 2016 by Stuart Burrows
The inside story on how an international organisation survived multiple challenges when migrating to Microsoft® Exchange 2010.
08 November 2016 by Milagros Gamero
The Data Loss Index has consistently shown us the “undetected” is the most common cause of data loss. But what can you find if you dig a little deeper?
04 November 2016 by Matt Prince
In this guest post from Blancco Technology Group we explore 6 ways to delete files from a Microsoft Active Directory to help improve your company’s security.
28 October 2016 by Sam Wiltshire
For something a bit different, we've created a free Chrome extension which will spookify your browsing!
21 October 2016 by Michael Nuncic
Wear levelling is a very useful technique that improves the longevity of an SSD.
18 October 2016 by Milagros Gamero
Discover the top triggers that initiate the need to restore data from archive tapes, and the technical issues that make legacy data difficult to manage.
11 October 2016 by Michael Nuncic
Two-Dimensional Magnetic Recording, Heat-Assisted Magnetic Recording, and Bit-Patterned Magnetic Recording: we explore the future of HDD technology.