04 August 2020 by Tilly Holland
30 July 2020 by Tilly Holland
28 July 2020 by Tilly Holland
The recovery of lost photos is one of the most frequent requests we receive. In this blog, we explore how you can protect your photos.
20 July 2020 by Tilly Holland
The virtual environment has now become a big part of mainstream technology. But, how do you protect your virtual environments and machines from data loss?
13 July 2020 by Tilly Holland
09 July 2020 by Tilly Holland
You’d have a tough time nowadays finding a person who’s never had a run-in with data loss. We’ve all known that sinking feeling when a power cut or crash sends an unsaved Word document spinning into the void, or when an internet connection cuts out and a web page full of forms is wiped blank. In the modern age, data loss is as certain as death and taxes.
05 July 2020 by Lynn Walker
Launching a new website is a big task! In this blog, our VP of Global Marketing, Lynn Walker delves into her experience launching the new Ontrack website.
04 June 2020 by Tilly Holland
A disaster recovery plan is vital for an organisation to ensure their data is protected from loss. How do you build a disaster recovery strategy?
07 May 2020 by Pedro Vasconcelos
Cloud storage has become popular, over the years however many people forget that the data stored in the cloud must still be kept at a physical location.
30 April 2020 by Tilly Holland
Virtual environments may have their benefits, but data loss is still a potential risk. Read how you can recover data from a virtualised environment.
27 April 2020 by Lynn Walker
The battle begins with a single laptop at a large pharmaceutical company infected with CryptoLocker ransomware, a malware that encrypts files and holds the key until the user pays the ransom amount. Once the laptop was on the company’s network it was able to access a CIFS volume set up as a file share on a NetApp FAS.
23 April 2020 by Tilly Holland
The virtual environment has now become a big part of mainstream technology. But, how do you protect your virtual environments and machines from data loss?
16 April 2020 by Tilly Holland
Virtualisation has grown exponentially over the last decade. It may be beneficial to organisations, but virtual data loss is still very frequent. Why?
09 April 2020 by Tilly Holland
Virtualisation, for the uninitiated, describes the use of software to provide a complete, functional simulation of a hardware environment. Data can be stored, programmes can be run, and memory can be managed precisely as if the virtual machine were an actual computer. Nowadays, this is very much an accepted part of business IT.
02 April 2020 by Mikey Anderson
Pros and cons of database virtualisation have steadily been shaping businesses and operations. But what are the main benefits of database virtualisation?
31 March 2020 by Tilly Holland
When creating a backup strategy, what should you consider to prevent data loss? Here we’ll take a look at the 3-2-1 backup method and what it involves.
26 March 2020 by Michael Nuncic
Ransomware attacks are on the rise, but what is it? And what can you put in place to prevent your company from being a victim of this growing malware?
19 March 2020 by Tilly Holland
Ensuring your organisation has secure data sanitisation methods in place is critical. Degaussing your hard drive is one such method that will destroy magnetic media.
12 March 2020 by Mikey Anderson
Does your organisation have an email retention policy in place that ensures you're staying compliant with GDPR regulations? Read our blog to find out more.
10 March 2020 by Laura Cooper
Do you know what you should be aware of when choosing an external IT asset disposal service? Find out in Ontrack's useful guide providing four key tips.

Call for Immediate Assistance!
- Data Backup (1)
- Data Erasure (6)
- Data Loss (7)
- Data Protection (7)
- Data Recovery (23)
- Data Recovery Software (1)
- Data Security (6)
- Data Storage (5)
- Deleted Data (1)
- Disaster Recovery (4)
- Erasure Verification (2)
- Expert Articles (5)
- Hard Drive (7)
- Laptop/Desktop (2)
- Memory Card (2)
- Mobile Device (6)
- NAS (3)
- Ransomware & Cyber Incident Response (7)
- Server (9)
- SSD (9)
- Tape (4)
- Virtual Environment (1)