How Security Must Adapt to the Internet of Things
From Amazon’s Alexa to Ring’s Video Doorbell, the Internet of Things (IoT) continues its transformation of technology. Not only is it enhancing the way human beings live, but the speed of innovation...
How Companies Can Access Your Smartphone Data
It is amazing; for almost every need, there's an app you can install on your smartphone – games, navigation, editors, barcode readers, messaging – there’s hardly a topic that doesn't exist. Since...
Secure deletion of data – comparison of degausser types
Reasons to securely and permanently delete data As we have discussed in this blog previously, there are several reasons why corporate and private computer users alike have to delete their stored...
Six things to consider when choosing a hypervisor
Virtualization, for the uninitiated, describes the use of software to provide a complete, functional simulation of a hardware environment. Data can be stored, programs can be run, and memory can be...
Device Backup Behavior Statistics
The annual World Backup Day on March 31st always provides good reason to consider one’s own approach to creating backups, as well detecting any possible weak points. For many people, making a backup...
How to recover data from a virtual environment
As discussed in our previous blog: ‘What are the causes of virtual system data loss? ’, the main causes of data loss from a virtual environment are hardware issues, formatting, metadata corruption,...