Go to Top

Blog Archives

About Jennifer Duits

Here are my most recent posts

Ransomware attacks Android phones

Ransomware is a type of malware that encrypts the user’s data and demands a fee, or ransom, for returning access to the data. It is very lucrative for criminals as many victims give in and pay to recover their data. It is no wonder that ransomware has started to target mobile devices as well. ESET has just warned of Lockerpin, the second virus to target Android handsets and the first …Read More

Data Breach and Cyber Attacks – what implications does that have for companies?

A data breach or a breach of data security is an incident in which sensitive, proprietary or confidential information is viewed, stolen or used by unauthorised third parties. This form of crime can both cause damage of property for example, sabotaging computer systems.  It can also lead to a violation of property rights, such as theft of source codes, customer data or other information. In addition, it could affect whole …Read More

History of Data Management

It is easy in the data storage and data management world and say that it is constantly changing and new technology is being developed every day. Looking back at the history of data storage and data management I discovered that some of today’s “new” technologies had been around (or conceptually around) for a lot longer than I had thought. What has really changed is how we manage data. The following …Read More

Big Data = Big Advancements in Technology

There have been some big developments surrounding enterprise storage and management of big data within the last few years.Examples are: virtualisation and Software Defined Storage (SDS) lowering the hardware cost of storage, ISO standards for cloud storage adding trust to the cloud, hybrid storage for speed, and the list goes on. The issue that enterprise storage manufacturers and managers alike have realised is that the amount of data is constantly  growing at alarming rates. …Read More

ISO 27018: Cloud Quality and Control

Among main characteristics of the ISO 27018 standard, there are those which require Cloud Service Provider (CSP) to allow users to control the quality of services for their data. The reporting given by the CSP gives interesting pieces of information about tools which are set up to enable this type of control. Currently, there are not a lot of cloud platforms which comply with ISO 27018, the ones that do …Read More

ISO 27018 – Adding Trust in Cloud Storage

The purpose of the ISO/IEC 27XXX family is to standardise the use of information technology. The ISO 27018 – that Microsoft claims to be the first one with certification on its Azure platform – is dedicated to Cloud services. What are the new standards? What does that involve? What does it mean? The standardisation of cloud storage seems to be almost impossible, yet, it is a question of methodology. One …Read More

Advantages and risks of Software Defined Storages (SDS)

In recent years, companies have had to contend with a large increase in data volumes and this trend will continue in the years to come. With each approaching year, more and more data is collected and stored.  According to a study conducted by EMC, our digital universe is growing 40 per cent a year into the next decade.  Just think about how much data you collect and store today versus five years …Read More

Using SMART Tools to Predict HDD Failure

In our previous blog, MTBF: Hard drive failure prediction?, we noted that the best-known methods for predicting hard disk drive (HDD) failure aren’t exactly scientific. Grinding and thrashing noises are a reliable indicator that a HDD is about to fail, for example, but that’s not very comforting when your drives are sitting out of earshot in a remote data centre. Using a metric called Mean Time Between Failures (MTBF) for …Read More

MTBF: Hard drive failure prediction?

At Kroll Ontrack, we’re well aware that data loss can affect anyone. For many of us, it comes in the form of hard disk drive (HDD) failure; mechanical and electronic defects that render the information stored therein unreadable. There are dozens of possible causes for this type of malfunction, ranging from logical software errors to physical damage. We can’t forget to mention that all storage devices have a finite lifespan. …Read More

Erasure Verification Service – Who and Why?

In our last blog we discussed the methods of data erasure, but how do you know your erasure methods are 100% effective. What if you need to provide third-party proof of erasure to your clients or for regulatory purposes?  Erasure Verification Services offer companies and manufacturers a written report detailing the effectiveness of their erasure process. We all know data security has been a hot topic in the news. Companies …Read More