Data Protection

Behind the Lens: How One Wedding Photographer Protects the Memories of a Lifetime

With the simple click of a smartphone you can take, store, share and even edit photos on the go. But when it comes to professional photography, the stakes are much higher. That's especially true for wedding photographers who are entrusted with capturing the Big Day. 

Craig Wolfrom, a professional photographer based in Sun Valley, Idaho, feels the pressure every time he points his camera at a happy bride and groom. Wolfrom, whose passion for photography started in grade school, focuses on wedding photography but also incorporates his passion for skiing, rock climbing and backpacking into his work. Because Wolfrom's photos are his livelihood, he has developed a detailed backup method for his photos to keep his business (and the new marriages he captures) running smoothly. 

Data Protection Takes Center Stage at CeBIT 2014

The worldwide technology trade show circuit is in full swing, but there's one show that's in a class all to glimpse the future of high-tech and IT: CeBIT. The annual confab attracts thousands of attendees and exhibitors every year who are eager to experience the latest and greatest technologies that will disrupt how we live and work. The Acronis team was on hand yet again this year.

The spectacle — and the beautiful spring weather — did not disappoint. One of the biggest themes at CeBIT this year? How businesses and IT pros can protect the piles of data produced by employees, and our increasingly connected devices. Don't fret if you missed the show. Here's a recap of the highs (and lows) from CeBIT 2014: 

'Internet of Things' Takes SXSW By Storm & The Web Turns 25: Weekly Roundup

The Internet of Things took center stage this week at South by Southwest (March 7 - 11 in Austin, Texas), the annual confab for all things music, film and tech. The slew of connected, "smart" devices remind us how far the Internet's come since its humble beginnings 25 years ago this week. But it begs the question: Where will all this wearable and mobile data get stored? Here's a look at what the experts have to say about that, and other IT challenges, in an increasingly data-driven world:

What Can Go Wrong If Your MSP Data Isn’t Secure

High-Profile Data Breaches Spur Debate on Consumer Notification

The fallout continues from last year's major data breaches at Target and Neiman Marcus. The U.S. Congress, state agencies, retailers and consumer advocacy groups are now locked in a larger debate about data security and consumers' right to know when their data may be at risk — and if a national notification standard makes sense, according to the Associated Press. 

The larger of the breaches, Target, exposed an estimated 40 million customer credit and debit card accounts to hackers, but the retail giant kept customers in the dark for several days. Why the delay? Lacking national regulations for how (and how quickly) consumers must be notified, retailers are left to sort though a puzzling patchwork of state regulations. 

Why BYOD Isn’t to Blame for Compromised Data

The rise of mobile technologies has undoubtedly complicated IT. But despite the benefits, including lower costs and increased employee productivity, there's lingering suspicion among IT pros about whether these technologies, and what trends like BYOD leave in their wake, put sensitive company data at risk. The anxiety is understandable — data protection, after all, is top of mind for IT managers — but that anxiety is often misplaced. 

With BYOD on the rise and showing no signs of slowing, it's important to dispel myths about the data risk of BYOD. More than likely, BYOD is not to blame when company or customer data goes missing. 

The Lingering Shadow IT Menace & New Generation Data Protection: Weekly Roundup

Data production is growing at an exponential rate, a trend that's challenging IT departments large and small to protect the loads of additional bits and bytes under their care. But the more things change, the more they seem to stay the same. From new data center technologies to the next battle royale in IT, here's a look at the stories data-crazed IT pros need to know from the web this week: 

Déjà Vu All Over Again in IT

It's early in the new year, but that doesn't always mean fresh start. eWeek's Chris Preimesberger writes that familiar IT problems keep popping up — and chief among them is the conflict between IT pros' need to secure data and employees who use the devices and applications of their choosing. Preimesberger cites several figures from industry analysts that show how pervasive the "shadow IT" problem remains:

IT Pros: To Protect Against 'Bit Rot,' Ask Cloud Vendors the Right Questions

Decay is a fact of life that applies to digital bits and bytes, as well as those leftovers in the shared company kitchen. When it comes to data, that decay, or "bit rot," can threaten the piles of business-critical information that IT departments increasingly trust cloud vendors to manage, store and protect. How can IT pros determine whether their cloud vendors will adequately protect data? It starts by asking the right questions.

Today, we are excited to unveil Acronis AnyData, a next generation data protection technology. Developed over the past 10 years, AnyData offers easy, complete and safe backup, disaster recovery and secure access capabilities across any and all environments and locations. 

Essentially, AnyData is one seamless system that offers the simplicity and cost-effectiveness companies need for complete data protection. The “Any” in AnyData means just that:

The advent of enterprise mobility has radically affected the way organizations conduct business. No matter whether you are talking to customers from markets as diverse as Pharma, Health, Financial, Education, Publishing, Advertising, Government, Legal, or service providers, it’s a fact that mobility is here to stay. But while it brings all kinds of benefits it also creates a new set of challenges.

Now organizations can be more productive than ever. CEOs can verify the latest contract while in the airport, researchers can work in the field and easily access all their data, and sales professionals can have access to the latest product presentations at any moment to lock in that big deal.

We’ve become far more productive and can even share synced files with teams distributed around the globe. However, this connectivity also raises flags about data security and how to prevent accidental leaks of sensitive files.

In this modern computing world with multitudes of trends and innovations, we sometimes find ourselves lost in between new technologies, terminologies and words. Why do we tend to make things more difficult than they have to be? This was my thought when I started a set of blog posts simply describing new computing trends. Here is another trend that I would like to simplify – Data Protection.

Data Protection is the process of copying a file, folder or volume on a storage device for the purpose of recovery in case the original data is accidentally erased, damaged or destroyed. You might know this process under different name which is much easier to remember, that name is Backup.