Thursday, July 9, 2020 by The Data Experts

Computer users and many experts often consider lost data permanently destroyed, with no hope of recovery. Information about lost data can be complex, inconsistent or inaccurate, so it's not surprising that data loss and data recovery are some of the most confusing and misunderstood concepts.

Read more


Sunday, July 5, 2020 by Lynn Walker

Launching a new website is a big task! In this blog, our Director of Marketing, Lynn Walker delves into her experience launching the new Ontrack website.

Read more


Friday, June 12, 2020 by Tilly Holland

No matter how big or small your business, it's important to plan for the worst. Our free disaster recovery plan template will ensure you're prepared.

Read more


Thursday, June 4, 2020 by Tilly Holland

A disaster recovery plan is vital for an organization to ensure their data is protected from loss. How do you build a disaster recovery strategy?

Read more


Thursday, May 7, 2020 by Pedro Vasconcelos

Cloud storage has become popular, over the years however many people forget that the data stored in the cloud must still be kept at a physical location.

Read more


Thursday, April 30, 2020 by Tilly Holland

Virtual environments may have their benefits, but data loss is still a potential risk. Read how data can be recovered from a virtualized environment.

Read more


Monday, April 27, 2020 by Lynn Walker

The battle begins with a single laptop at a large pharmaceutical company infected with CryptoLocker ransomware, a malware that encrypts files and holds the key until the user pays the ransom amount. Once the laptop was on the company’s network it was able to access a CIFS volume set up as a file share on a NetApp FAS. The virus was able to infiltrate the file share and encrypt the majority of the files. This infection impacted the user’s entire department, bringing their day to day operations to a grinding halt.

Read more


Thursday, April 23, 2020 by Tilly Holland

Virtual environments have now become a big part of mainstream technology. But, how do you protect your virtual environments and machines from data loss?

Read more


Thursday, April 16, 2020 by Michael Nuncic

Virtualization has grown exponentially over the last decade. It may be beneficial to organizations, but data loss is still very frequent. Why is that?

Read more


Thursday, April 9, 2020 by Tilly Holland

Ensuring you choose the most suitable hypervisor for your organization is critical. Follow these six points to ensure you choose the right one for you.

Read more


Thursday, April 2, 2020 by Tilly Holland

Pros and cons of database virtualisation have steadily been shaping businesses and operations. But what are the benefits of database virtualisation?

Read more


Tuesday, March 31, 2020 by Tilly Holland

When creating a backup strategy, what should you consider to prevent data loss? Here we’ll take a look at the 3-2-1 backup method and what it involves.

Read more


Thursday, March 26, 2020 by Michael Nuncic

Ransomware attacks are on the rise, but what is it? And what can you put in place to prevent your company from being a victim of this growing malware?

Read more


Thursday, March 19, 2020 by Tilly Holland

Ensuring your organisation has secure data sanitisation methods in place is critical. Degaussing is one such method that will destroy magnetic media.

Read more


Tuesday, March 17, 2020 by Jennifer Duits

In a recent blog, we discussed the methods of data erasure; most organizations have a technique or protocol in place, but how can they be sure that it's 100% effective and that every trace of data has gone? There are also circumstances where clients ask for third-party proof of the erasure process for regulatory purposes. The answer is erasure verification.

Read more


Thursday, March 12, 2020 by Mikey Anderson

Does your organization have an email retention policy in place that ensures you're staying compliant with GDPR regulations? Read our blog to find out more.

Read more


Tuesday, March 10, 2020 by Mikey Anderson

Whether you are relocating, refreshing your IT estate or heading to the cloud – you will undoubtedly generate redundant IT hardware and as a result, will need to ensure that you erase any residing data on that equipment. When choosing to trust a new partner to manage your IT asset disposal and confidential data, you can often face a dilemma. How do you know you’re making the right choice? What criteria, industry guidance or performance measures do you work from, to ensure your decision is solid?

Read more


Friday, March 6, 2020 by Lynn Walker

Read more


Thursday, March 5, 2020 by Tilly Holland

Organizations redeploy their computer equipment regularly rather than choosing to throw them away. But are they aware of the security risks of doing so?

Read more


Tuesday, March 3, 2020 by Michael Nuncic

Read more