Recovering data from ransomware attacks
When organizations are struck with ransomware, and crucial data can’t be accessed, it can be an extremely stressful time for all involved. Getting access to that critical data as quickly as possible...
How Can I Erase Data From SSDs?
A versatile and reliable mass storage device, the Solid-State Drive (SSD) has transitioned from a boutique product to one of mainstream consumer and enterprise use, functioning as a direct...
The Data Center of Tomorrow
Recently, our President, Philip Bridge was asked for his thoughts on the future of the data center by Networks Europe. Here are his main thoughts. With the digital transformation of the world we live...
How to Destroy End-of-Life-Data Securely.
We have previously discussed the topics of data encryption and data security. Encryption is just one area of data security, and data security rolls up into the broader category of data management....
Hardware vs. Software Encryption
Encryption is an incredibly important tool for keeping your data safe. When your files are encrypted, they are completely unreadable without the correct encryption key. If someone steals your...
How Security Must Adapt to the Internet of Things
From Amazon’s Alexa to Ring’s Video Doorbell, the Internet of Things (IoT) continues its transformation of technology. Not only is it enhancing the way human beings live, but the speed of innovation...