Go to Top

Tag Archives

Tag Archives: data security

Choosing an IT Asset Disposal Provider

The European Union (EU) has introduced the General Data Protection Regulation (GDPR) set to be enforced on May 25, 2018.  This regulation replaces the Data Protection Directive 95/46/EC.  How will GDPR directly impact the United States?  In the past, U.S.-based regulations were a primary driver of compliance requirements.  This is changing with the introduction of the GDPR.  The GDPR requires organizations to understand what information they have, who has access …Read More

Live Server Erasure – How to Erase Data From a Running Server

Securely erasing data is definitely not an easy task. Whether it’s a single hard disk drive or a SSD in a laptop or many enterprise class storage devices inside a live server – just pressing the delete button on the keyboard just won´t cut it. As we have pointed out in previous blog posts, using the “Recycle Bin” and deleting a file is not enough. The same is true with …Read More

Protecting NAS Devices from Data Loss

NAS (Network Attached Storage) as a storage option is unbeatable. It’s cost-effective, functional and flexible. However, as with all storage devices, data loss cannot be completely ruled out.  Each NAS device data loss has its own history, but there are frequently occurring scenarios that require a restoration of network storage. Human error: Human error is a common cause when NAS/ RAID (redundant array of independent disks) data is lost. Data …Read More

The Black Market for Data

If the right kind of personal data – credit card numbers, email addresses, online credentials, or bank account information – falls into the wrong hands, you can be sure criminals will use that data for their personal gain or sell it on the black market, where buyers and sellers anonymously deal in stolen or illegal goods and services. On the darknet, the secret and hidden part of the Internet, everything …Read More

Encryption – What Would it Take to Crack It?

Due to the recent rise in ransomware attacks, encryption has become an important issue.  The history of the encoding information began about 4,000 years ago.  Egyptian scribes used special hieroglyphs to encode grail inscriptions.  News – be it war or simple love letters – were written in such a way that an unintended reader could not grasp the meaning. One of the simplest methods is moving characters in the ABC …Read More

Secure Data Erasure Management with Hosted Erase

Revelations of data leaks are now part of the daily business news.  Whether large Internet providers or telecommunications companies or the customer database of a global player are affected – the statistics show alarming figures regarding the frequency and success of cyber attacks and attacks on sensitive information from illegal data collectors.  This increases the pressure on large corporations and companies that are obligated to protect and prevent their electronic …Read More

The Perfect Backup

Whether smartphone or tablet, Windows PC or Mac:  In today’s time a proper backup is a duty, at least of the most important data.  Accidents can occur, thieves are on the move and data theft in electronic assistants pile up. We don´t want to propose single programs here, but offer an overview of what has to be respected to be on the safe side with the backup process. Since it’s …Read More

How Secure Is The Cloud?

How secure is the cloud? While some people still associate the cloud with a lack of security, perceptions are changing.  Proponents of the cloud industry say it is very safe, and highlight that like any other purchasing decision, corporations must do their due diligence and ensure that they choose an established supplier. First, make sure you’re ready to go “cloud” One place to start is to look at their reference …Read More

Encryption decrypted

What is encryption? Encryption is the process of transforming information (referred to as plaintext) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a “key”. The result of the process is encrypted information. In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. …Read More

GDPR – Will On-site Data Erasure be a Must?

The General Data Protection Regulation (GDPR) has officially gone into effect and many companies are now adopting their data protection and business continuity plans to these new rules in order to avoid the massive fines for non-compliance.  For most companies, these fines can be  life threatening, with up to four percent of the total worldwide turnover, every aspect of the law has to be checked and if necessary to be …Read More