Find the latest posts and news related to data security, cloud storage and advanced data protection.

Data Security

How to Destroy a Hard Drive

How to Destroy a Hard Drive

How to Destroy a Hard Drive When replacing an older desktop, you may have reservations about just chucking it into the bin. You’ll need to be certain that you’ve erased all the information contained on your computer’s hard drive. This task can be tougher than you think, but we’ve collected a number of methods that … Continued

Internet Pirates

Internet Pirates

Internet Pirates There are two new nasty computer malware strains currently terrorizing both PC’s and Mac’s. They have gained momentum since their first reports early this year. Both are prolific, becoming more sophisticated in their delivery, and demand a ransom from their victims. We think they’re the new age version of pirates searching for prey … Continued

The government put a giant target on your computer

The government put a giant target on your computer

Hackers make our online lives dangerous, never knowing when we’ll be subject to a nefarious attack of either our own computer system or bank or other service provider that houses our private data. Protecting, encrypting and backing up our files has never been more critical in our technology dependent world. Now it seems, our own … Continued

Types of Cyber Attacks

Types of Cyber Attacks

The rate and intensity of cyber attacks is escalating and probably affecting your internet activity and you don’t even know it. (Read more.) In late March, spam-fighting organization Spamhaus was the target of a massive DDoS (distributed denial of service) attack and it was considered the most severe attack since the invention of the Internet – … Continued

Strategies to Prevent DDoS attacks

Strategies to Prevent DDoS attacks

If you think you’re seeing more news about computer hackers, you’re right. It seems this underground community continues to wreck havoc in our online lives and businesses through increasingly sophisticated means of mischief. While the most publicized hacking events highlight stolen data, that’s not always the motivating factor. Some hackers have mastered the art of DDoS attacks, or … Continued

Data Protection Audit – Systems, Devices and IT Operations

Data Protection Audit – Systems, Devices and IT Operations

Your data protection audit lays out the plan that enables you to sleep at night knowing that data loss couldn’t destroy your business or be a costly and burdensome event. In the previous installment of our three part data protection audit series, we looked at the questions you need to ask regarding your data requirements … Continued

Data Protection Audit Planning

Data Protection Audit Planning

In part one of “How to plan and execute a data protection audit,” we discussed the importance of user participation in the design process of your data audit plan. In this installment, we go into more detail about the questions you need to ask about your business processes to determine what you need to secure. When … Continued