Data Protection

Is Your Data Covered in a Multi-Hypervisor World? Q&A With Acronis' Sam Roguine

It's every IT pro's job to stay on top of the latest technology trends that could help turn a profit or increase employee productivity. Virtualization is so commonplace — Gartner, for example, estimates that Windows servers are nearly 70 percent virtualized — that IT pros might not give it much thought. And that can create problems since virtual data must be protected, starting with the driving force behind virtualization: the hypervisor. 

Here, Sam Roguine, Asia-Pacific engineering director at Acronis, discusses why IT pros neglect to back up the hypervisor, how that puts company data at risk and the need for technology to solve the migration and disaster recovery challenges in a multi-hypervisor world. Are you covered?

HIPAA Makes Data Protection a Top Priority for Health Care IT

Health care is in the headlines this week because of Monday's deadline for uninsured Americans to enroll in Obamacare. But a separate health care law, the Health Insurance Portability and Accountability Act (HIPAA), has big implications for how providers store, protect and back up their patients' data. 

HIPAA sets rules and regulations on who can access personal medical information — and with penalties up to $1.5 million per incident for noncompliance or negligence, data protection is quickly becoming a top priority for health care IT pros. 

Behind the Lens: How One Wedding Photographer Protects the Memories of a Lifetime

With the simple click of a smartphone you can take, store, share and even edit photos on the go. But when it comes to professional photography, the stakes are much higher. That's especially true for wedding photographers who are entrusted with capturing the Big Day. 

Craig Wolfrom, a professional photographer based in Sun Valley, Idaho, feels the pressure every time he points his camera at a happy bride and groom. Wolfrom, whose passion for photography started in grade school, focuses on wedding photography but also incorporates his passion for skiing, rock climbing and backpacking into his work. Because Wolfrom's photos are his livelihood, he has developed a detailed backup method for his photos to keep his business (and the new marriages he captures) running smoothly. 

Data Protection Takes Center Stage at CeBIT 2014

The worldwide technology trade show circuit is in full swing, but there's one show that's in a class all to glimpse the future of high-tech and IT: CeBIT. The annual confab attracts thousands of attendees and exhibitors every year who are eager to experience the latest and greatest technologies that will disrupt how we live and work. The Acronis team was on hand yet again this year.

The spectacle — and the beautiful spring weather — did not disappoint. One of the biggest themes at CeBIT this year? How businesses and IT pros can protect the piles of data produced by employees, and our increasingly connected devices. Don't fret if you missed the show. Here's a recap of the highs (and lows) from CeBIT 2014: 

'Internet of Things' Takes SXSW By Storm & The Web Turns 25: Weekly Roundup

The Internet of Things took center stage this week at South by Southwest (March 7 - 11 in Austin, Texas), the annual confab for all things music, film and tech. The slew of connected, "smart" devices remind us how far the Internet's come since its humble beginnings 25 years ago this week. But it begs the question: Where will all this wearable and mobile data get stored? Here's a look at what the experts have to say about that, and other IT challenges, in an increasingly data-driven world:

What Can Go Wrong If Your MSP Data Isn’t Secure

High-Profile Data Breaches Spur Debate on Consumer Notification

The fallout continues from last year's major data breaches at Target and Neiman Marcus. The U.S. Congress, state agencies, retailers and consumer advocacy groups are now locked in a larger debate about data security and consumers' right to know when their data may be at risk — and if a national notification standard makes sense, according to the Associated Press. 

The larger of the breaches, Target, exposed an estimated 40 million customer credit and debit card accounts to hackers, but the retail giant kept customers in the dark for several days. Why the delay? Lacking national regulations for how (and how quickly) consumers must be notified, retailers are left to sort though a puzzling patchwork of state regulations. 

Why BYOD Isn’t to Blame for Compromised Data

The rise of mobile technologies has undoubtedly complicated IT. But despite the benefits, including lower costs and increased employee productivity, there's lingering suspicion among IT pros about whether these technologies, and what trends like BYOD leave in their wake, put sensitive company data at risk. The anxiety is understandable — data protection, after all, is top of mind for IT managers — but that anxiety is often misplaced. 

With BYOD on the rise and showing no signs of slowing, it's important to dispel myths about the data risk of BYOD. More than likely, BYOD is not to blame when company or customer data goes missing. 

The Lingering Shadow IT Menace & New Generation Data Protection: Weekly Roundup

Data production is growing at an exponential rate, a trend that's challenging IT departments large and small to protect the loads of additional bits and bytes under their care. But the more things change, the more they seem to stay the same. From new data center technologies to the next battle royale in IT, here's a look at the stories data-crazed IT pros need to know from the web this week: 

Déjà Vu All Over Again in IT

It's early in the new year, but that doesn't always mean fresh start. eWeek's Chris Preimesberger writes that familiar IT problems keep popping up — and chief among them is the conflict between IT pros' need to secure data and employees who use the devices and applications of their choosing. Preimesberger cites several figures from industry analysts that show how pervasive the "shadow IT" problem remains:

IT Pros: To Protect Against 'Bit Rot,' Ask Cloud Vendors the Right Questions

Decay is a fact of life that applies to digital bits and bytes, as well as those leftovers in the shared company kitchen. When it comes to data, that decay, or "bit rot," can threaten the piles of business-critical information that IT departments increasingly trust cloud vendors to manage, store and protect. How can IT pros determine whether their cloud vendors will adequately protect data? It starts by asking the right questions.

Today, we are excited to unveil Acronis AnyData, a next generation data protection technology. Developed over the past 10 years, AnyData offers easy, complete and safe backup, disaster recovery and secure access capabilities across any and all environments and locations. 

Essentially, AnyData is one seamless system that offers the simplicity and cost-effectiveness companies need for complete data protection. The “Any” in AnyData means just that: