Go to Top

Information Management

Mission-Critical Servers: Protecting the Nest

We’ve discussed in previous posts how the growth of cloud computing, mobile transactions, and social networking is changing the computing landscape and how organizations will meet the demands of this ever-changing environment.  At the core of this growth, mission-critical servers allow enterprises to work across multiple channels and devices to support their employees, customers, and e-commerce.  As the demand and dependency on these servers increases, so too does the need …Read More

How to Diagnose a Physical Hard Drive Failure

Interview with Martin Hiller, Head of Kroll Ontrack Clean Room Böblingen, Germany Q: A lot of computer users nowadays inform themselves about what to do in case of a physical hard disk drive failure via websites, blogs, forums etc., instead of immediately contacting a professional data recovery service provider. In many cases they download and try to use really specialized tools to access hard disk drives that are even physically …Read More

Live Server Erasure – How to Erase Data From a Running Server

Securely erasing data is definitely not an easy task. Whether it’s a single hard disk drive or a SSD in a laptop or many enterprise class storage devices inside a live server – just pressing the delete button on the keyboard just won´t cut it. As we have pointed out in previous blog posts, using the “Recycle Bin” and deleting a file is not enough. The same is true with …Read More

Cloud Migration: What to Consider When Switching Providers

Cloud computing has become more than just a technology trend. According to Forrester research, the global public cloud market will raise from $146 billion this year to $236 billion in 2020. Cloud computing offers many benefits to companies: The need for hardware and software is reduced drastically.  In addition, costs for energy, employees, software licenses can be scaled down almost immediately after data or applications have been moved into the …Read More

Ransomware – Will it Stay or Will it Go?

Since 2010, there has been an increase of reported attacks from blackmail viruses.  The spread of the Locky in February 2016, represented an unprecedented rise of ransomware. In April 2016, the German Federal Office for Information Security (BSI) conducted a survey of nearly 600 companies.  The results showed that 32 percent, or one third of companies, were affected by ransomware.  In 82 percent of all cases, email was the gateway …Read More

Software-Defined Storage and Hyper-Converged Solutions

IT administrators and managers continually strive to streamline their costs in the data center. Year after year, more servers in the data center are being run as virtual servers. The result is fewer physical servers, less energy consumption, and lower hardware and maintenance costs. To manage these massive amounts of virtual machines and virtual servers, SDS (software-defined storage) uses and establishes a software layer to manage and combine all the …Read More

Smartphone data: How companies can access your private information

It is amazing; for almost every need, there’s an app you can install on your smartphone – games, navigation, editors, barcode readers, messaging – there’s hardly a topic that isn’t covered.  Since almost everything can be installed for free, how do developers finance these programs? The financing for free apps works on the one hand, of course, by advertising.  If you don’t want to see advertisements, there is typically a …Read More

Protecting NAS Devices from Data Loss

NAS (Network Attached Storage) as a storage option is unbeatable. It’s cost-effective, functional and flexible. However, as with all storage devices, data loss cannot be completely ruled out.  Each NAS device data loss has its own history, but there are frequently occurring scenarios that require a restoration of network storage. Human error: Human error is a common cause when NAS/ RAID (redundant array of independent disks) data is lost. Data …Read More

The Black Market for Data

If the right kind of personal data – credit card numbers, email addresses, online credentials, or bank account information – falls into the wrong hands, you can be sure criminals will use that data for their personal gain or sell it on the black market, where buyers and sellers anonymously deal in stolen or illegal goods and services. On the darknet, the secret and hidden part of the Internet, everything …Read More

2016 Results: Self-Assessment Tool

Since Kroll Ontrack launched its free and anonymous Self-Assessment Tool in April 2015, almost 10,000 people have used the tool to gain valuable information about what to do when they are struck by a data loss.  And over those last couple of years, the tool has not only helped users by providing a fast and free of charge assessment of what might be the cause of their data loss, but …Read More