Go to Top

Blog Archives

About Kathrin Brekle

Here are my most recent posts

Encryption – What Would it Take to Crack It?

Due to the recent rise in ransomware attacks, encryption has become an important issue.  The history of the encoding information began about 4,000 years ago.  Egyptian scribes used special hieroglyphs to encode grail inscriptions.  News – be it war or simple love letters – were written in such a way that an unintended reader could not grasp the meaning. One of the simplest methods is moving characters in the ABC …Read More

Anatomy of a Ransomware Attack

2016 was the year of blackmail ransomware.  Data is encrypted by smuggling malicious programs into the infected system and making them useless.  Only after payment of “ransom” money the data is usable again. This kind of blackmail is not new.  Back in 1989, the Trojan “AIDS.exe” was able to hide files and by this way making them unusable.  However, the program changed only the file names while the contents remained …Read More

Secure Data Erasure Management with Hosted Erase

Revelations of data leaks are now part of the daily business news.  Whether large Internet providers or telecommunications companies or the customer database of a global player are affected – the statistics show alarming figures regarding the frequency and success of cyber attacks and attacks on sensitive information from illegal data collectors.  This increases the pressure on large corporations and companies that are obligated to protect and prevent their electronic …Read More

Software Defined Storage and Hyper Converged Storage: has the focus on hardware come to an end?

Modern information technology in business is subject to constant change. Not only the growing flood of data, but also the increasing demands of fast access to information and instant communication leads to new technical innovations to cope with the large amounts of data. In this article we want to give you an overview of key trends such as Software Defined Storage (SDS) and Hyper-converged storage, as well as an overview …Read More

The Perfect Backup

Whether smartphone or tablet, Windows PC or Mac:  In today’s time a proper backup is a duty, at least of the most important data.  Accidents can occur, thieves are on the move and data theft in electronic assistants pile up. We don´t want to propose single programs here, but offer an overview of what has to be respected to be on the safe side with the backup process. Since it’s …Read More