Go to Top

Information Management

The Black Market for Data

If the right kind of personal data – credit card numbers, email addresses, online credentials, or bank account information – falls into the wrong hands, you can be sure criminals will use that data for their personal gain or sell it on the black market, where buyers and sellers anonymously deal in stolen or illegal goods and services. On the darknet, the secret and hidden part of the Internet, everything …Read More

2016 Results: Self-Assessment Tool

Since Kroll Ontrack launched its free and anonymous Self-Assessment Tool in April 2015, almost 10,000 people have used the tool to gain valuable information about what to do when they are struck by a data loss.  And over those last couple of years, the tool has not only helped users by providing a fast and free of charge assessment of what might be the cause of their data loss, but …Read More

Spring Cleaning your Electronic Devices Properly

With spring on the way, many of us will start cleaning our desks and our homes, but what about spring cleaning our devices?  Now is a perfect time to clean them out and increase your storage space for the year ahead.  Before you start though, you should ask yourself what you’d like to gain by cleaning out your device.  Are you looking to increase performance or increase storage space?  Do …Read More

How to Migrate your Legacy Tapes to a New Backup Solution

The basics of tape migration and the questions that arise Tape as an archive and data storage medium has been around for over 60 years now and it’s still widely used in companies of all sizes.  Tape has its advantages – durability and low cost compared to other media – but that can also be its drawback. Over the years companies tend to change tape formats, as well as tape …Read More

Why Preventing Virtualization Sprawl Matters

Virtualization is not only for early-adopters or IT geeks anymore. The technology has found its place in almost every IT department and data center, but the advantages of the technology – fast and almost immediate server deployment, increased server uptime, and isolated applications – also has its disadvantages. One of them being virtualization sprawl . Since creating and running a virtual machine (VM) or virtual servers is very easy and …Read More

Why Should you Erase Virtual Data?

Traditionally, getting rid of data from storage media has often been limited to hard drives from old PCs and laptops once they reach the end of their usable lifespan.  However, with today’s technology, the need to securely erase information has extended way past the point of erasing just single drives and encompasses much more than just physical storage. For example, the large storage systems that you find in data centers …Read More

How to Quickly Check if a Hard Drive is Working Properly

Whether you’re a private user or work within an IT department, you can sometimes be presented with a stark reality –  hard drives are no longer working as they should and/or data suddenly disappears.  Unlike the usual symptoms of a loud scratching or ‘clicking’ noise, it’s not always immediately clear whether a hard drive is physically defective or not.  Thus, many users are initially irritated and do not know how …Read More

Encryption – What Would it Take to Crack It?

Due to the recent rise in ransomware attacks, encryption has become an important issue.  The history of the encoding information began about 4,000 years ago.  Egyptian scribes used special hieroglyphs to encode grail inscriptions.  News – be it war or simple love letters – were written in such a way that an unintended reader could not grasp the meaning. One of the simplest methods is moving characters in the ABC …Read More

Anatomy of a Ransomware Attack

2016 was the year of blackmail ransomware.  Data is encrypted by smuggling malicious programs into the infected system and making them useless.  Only after payment of “ransom” money the data is usable again. This kind of blackmail is not new.  Back in 1989, the Trojan “AIDS.exe” was able to hide files and by this way making them unusable.  However, the program changed only the file names while the contents remained …Read More