Go to Top

Pieces of Interest

Data recovery, data destruction and data management pieces of interest.

Secure deletion of data – Comparison of Degausser Types

Reasons to securely and permanently delete data As we have discussed in this blog previously, there are several reasons why corporate and private computer users alike have to delete their stored data. For corporate, storing data beyond the data lifespan can cause unnecessary costs and in several cases, it is even mandatory to securely erase the data after a fixed time period. Additionally, when a firm wants to change their …Read More

Ransomware attacks Android phones

Ransomware is a type of malware that encrypts the user’s data and demands a fee, or ransom, for returning access to the data. It is very lucrative for criminals as many victims give in and pay to recover their data. It is no wonder that ransomware has started to target mobile devices as well. ESET has just warned of Lockerpin, the second virus to target Android handsets and the first …Read More

Data Breach and Cyber Attacks – what implications does that have for companies?

A data breach or a breach of data security is an incident in which sensitive, proprietary or confidential information is viewed, stolen or used by unauthorised third parties. This form of crime can both cause damage of property for example, sabotaging computer systems.  It can also lead to a violation of property rights, such as theft of source codes, customer data or other information. In addition, it could affect whole …Read More

History of Data Management

It is easy in the data storage and data management world and say that it is constantly changing and new technology is being developed every day. Looking back at the history of data storage and data management I discovered that some of today’s “new” technologies had been around (or conceptually around) for a lot longer than I had thought. What has really changed is how we manage data. The following …Read More

Big Data = Big Advancements in Technology

There have been some big developments surrounding enterprise storage and management of big data within the last few years.Examples are: virtualisation and Software Defined Storage (SDS) lowering the hardware cost of storage, ISO standards for cloud storage adding trust to the cloud, hybrid storage for speed, and the list goes on. The issue that enterprise storage manufacturers and managers alike have realised is that the amount of data is constantly  growing at alarming rates. …Read More

Windows Server 2003 Extended Support Ends July 14

On July 14th Microsoft will end the extended support for Windows Server 2003.  From this point on,there will no longer be security updates or patches for the product.  This not only affects Windows Server 2003, but also Windows Server 2003 R2 and Small Business Server 2003/2003 R2.  Experts warn that new hacking tools may be able to take advantage of previously undiscovered vulnerabilities in the operating system, potentially acting as …Read More

ISO 27018: Cloud Quality and Control

Among main characteristics of the ISO 27018 standard, there are those which require Cloud Service Provider (CSP) to allow users to control the quality of services for their data. The reporting given by the CSP gives interesting pieces of information about tools which are set up to enable this type of control. Currently, there are not a lot of cloud platforms which comply with ISO 27018, the ones that do …Read More