Data Protection

Weekly Tech Roundup — March 20

Weekly Tech Roundup — 20

Don’t get left in the dust — new innovations in the technical sphere could leave your data more vulnerable than before. Whether it’s because of third-party access to your accounts, outdated operating systems, or lax data storage, your information is just waiting to be hacked or leaked. Do you know what’s in store for your data?

Top 5 Tips for Good SharePoint Backup

Top 5 Tips for Good SharePoint Backup

Microsoft SharePoint is a popular online collaboration tool used by many companies around the world. Since its introduction in 2001, the product has captured a large share of the market.

Just like your email, databases, ERP and CRM systems, SharePoint is now a business application that you must include in your data protection strategy in order to ensure maximum business continuity. However, SharePoint’s scalability and multiple deployment options can make backups challenging.

Weekly Tech Roundup — March 13

Weekly Tech Roundup — March 13

The world is adapting to increasing cybersecurity threats, but the impact these changes will have, have only just begun. With vigilante hackers, proposed government bills, and increased rating standards, it seems like the fate of our digital data might be looking up. But with these increases in data protection and security, come sneakier techniques from cybercriminals all their own. What tech headlines did you miss?

How to Avoid Ransomware: A Few Simple Tips

The internet has become an integral part of our lives. Millions of people go online every day, searching for new ways to work, communicate, and belong. While we all have different tastes, interests, and favorite websites, it’s important to stay vigilant every time you go online. Cyber criminals are out there too, analyzing online behavior of every-day users and looking for new opportunities to infect computers. Let common sense (and a few security measures) prevail!

Just by following a few simple tips, you can protect your system from being infected even if ransomware slips through into your computer. Follow these guidelines and spread the word. Together we can make the internet a safer place.

Why You Need an Acronis True Image Account

Read on to learn what doors the Acronis True Image “Account” screen opens. Plus, we’ll share how anyone (even non-customers!) can receive 5TB of cloud storage free to back up iPhone and Android data.

Upgrading to Windows 10? Backup Everything Before You Do!

Windows 10 Upgrade

Microsoft recently announced that development of the latest Windows 10 Update (dubbed the Windows 10 Creators Update) has entered the final “bug bashing” testing phase. That means it will likely hit the streets as soon as April 2017. There are many lessons to be learned from the original Windows 10 launch, so read on to find out how to protect your critical data and ensure a smooth Windows 10 update experience.

 

Weekly Tech Roundup — March 6

Technology News

With malware transformations, cloud service outages, and data loss making headlines last week, it’s important that we take a step back and look at our own computer habits. New techniques give cybercriminals the ability to hack into our PCs, smartphones and IoT devices. Innovations also let them hack into our financial institutions. Are you sure that your data is safe? Find out what could put it in harm’s way.

Business Continuity Plan

As many as 25% of businesses who lose access to their data never reopen their doors.  This startling fact means that service providers practically have a moral obligation, if not a revenue incentive, to make sure that their customers have a business continuity plan.  Even in times when total outages are not occurring, employee productivity, customer satisfaction and company reputation can be affected.

Business continuity is the process of making sure the business information services are resilient to accidental, intentional or natural disruptions to their data.  Sometimes, the business continuity issue is simply human error. Perhaps someone deletes a key file from a system which causes it to break.  Other times, device failures or even natural disasters will require the implementation of the protocols in the business continuity plan. What do you need to consider when developing a business continuity plan? Read on to find out!

Weekly Tech Roundup — February 27, 2017

When it comes to cyber threats, the future is here—malware attacking new devices in new ways and jumping on popular technology trends to do it. Phones aren’t safe, computers aren’t safe, and in some instances, it doesn’t even take clicking on the wrong link or attachment to become a victim of an attack. Keeping up with these threats is becoming a full-time job, and it’s imperative that we do whatever it takes to keep our data safe.

With each week looking slightly different from the last, what tech headlines did you miss?

Eric O’Neill: Most of Ransomware Attacks Affect Home Users

Eric O’Neil: Ransomware Attacks Home Users

Frank Jablonski, Acronis Vice President of Global Product Marketing, talks about cyber security with Eric O’Neill, an accomplished public speaker and security expert, who lectures internationally about espionage, cyber security, fraud, and hacking.

What are the top 3 recommendations you would make to consumers to protect their data from security threats?

Security threats are certainly coming after consumers, not just enterprises. We tend to think of it as a problem for business or government, as we see so many hacks and attacks that go after the offices like the Office of Personnel Management, and different government agencies and businesses, like Sony. But the fact of the matter is that most of the malware is affecting the grandparents and parents and just the person with an email account and a computer. And so, if the regular consumers have to protect themselves, they have to do something. There are three good steps:

  1. Technology. You have to have a solution that gives you a preventative defence that you need. Something that is going to search out the malware, something that is going to stop it before it infects you.
  2. Good cyber hygiene.  If you don’t have that, if you’re not smart about how you access things online, if you’re not being careful with your social media, if you’re clicking those links that you get in those emails that don’t really come from your friends — but they are spear phishing attacks, then you’re going to get hit by something like ransomware and lose all your data (unless you pay some hacker sitting somewhere else in the world).
  3. Good backup. Even the best solution can sometimes miss the attack, just because the attackers are that good. So you have to have a good backup that is efficient and quick. It will protect you and let you recover your data in case you get attacked.