Go to Top

Data Recovery

The Black Market for Data

If the right kind of personal data – credit card numbers, email addresses, online credentials, or bank account information – falls into the wrong hands, you can be sure criminals will use that data for their personal gain or sell it on the black market, where buyers and sellers anonymously deal in stolen or illegal goods and services. On the darknet, the secret and hidden part of the Internet, everything …Read More

2016 Results: Self-Assessment Tool

Since Kroll Ontrack launched its free and anonymous Self-Assessment Tool in April 2015, almost 10,000 people have used the tool to gain valuable information about what to do when they are struck by a data loss.  And over those last couple of years, the tool has not only helped users by providing a fast and free of charge assessment of what might be the cause of their data loss, but …Read More

Spring Cleaning your Electronic Devices Properly

With spring on the way, many of us will start cleaning our desks and our homes, but what about spring cleaning our devices?  Now is a perfect time to clean them out and increase your storage space for the year ahead.  Before you start though, you should ask yourself what you’d like to gain by cleaning out your device.  Are you looking to increase performance or increase storage space?  Do …Read More

How to Migrate your Legacy Tapes to a New Backup Solution

The basics of tape migration and the questions that arise Tape as an archive and data storage medium has been around for over 60 years now and it’s still widely used in companies of all sizes.  Tape has its advantages – durability and low cost compared to other media – but that can also be its drawback. Over the years companies tend to change tape formats, as well as tape …Read More

Introducing the Kroll Ontrack Data Academy

On a daily basis, our data recovery engineers are busy recovering precious data for our customers, but have you ever wondered about the “magic” that goes on behind the scenes?  If so, we invite you to sign up for the first course in the Kroll Ontrack Data Academy, where one of our own data recovery engineers will share their knowledge with you and reveal the secrets of the data you …Read More

Encryption – What Would it Take to Crack It?

Due to the recent rise in ransomware attacks, encryption has become an important issue.  The history of the encoding information began about 4,000 years ago.  Egyptian scribes used special hieroglyphs to encode grail inscriptions.  News – be it war or simple love letters – were written in such a way that an unintended reader could not grasp the meaning. One of the simplest methods is moving characters in the ABC …Read More

Anatomy of a Ransomware Attack

2016 was the year of blackmail ransomware.  Data is encrypted by smuggling malicious programs into the infected system and making them useless.  Only after payment of “ransom” money the data is usable again. This kind of blackmail is not new.  Back in 1989, the Trojan “AIDS.exe” was able to hide files and by this way making them unusable.  However, the program changed only the file names while the contents remained …Read More

Storage Trends and Predictions for 2017

Storage Trends and Predictions for 2017 Working for the leading global data recovery company, Kroll Ontrack specialists see a variety of storage devices and technologies come and go over the years when they fail to function and data loss occurs.  As older storage technologies make way for newer technologies – and since no medium or technology is failure-proof, one day it will come into one of our several data recovery …Read More

The Need for Emergency Recovery Services

As businesses rely more and more on digital systems and data to improve the delivery of their goods and services, the need for emergency data recovery rises.  When a data center experiences downtime the company not only is at risk of losing revenue, but it could face costly fines for goods and services that weren’t delivered as well.  Every minute counts when data loss in an enterprise storage environment occurs. …Read More

Secure Data Erasure Management with Hosted Erase

Revelations of data leaks are now part of the daily business news.  Whether large Internet providers or telecommunications companies or the customer database of a global player are affected – the statistics show alarming figures regarding the frequency and success of cyber attacks and attacks on sensitive information from illegal data collectors.  This increases the pressure on large corporations and companies that are obligated to protect and prevent their electronic …Read More