No one wants to believe that their organization will be the target of compliance auditors and potential fines and penalties for non-compliance, but that threat is real and increasing. Some organizations believe that they cannot afford the necessary precautions to meet heightened compliance standards. However, a recent study conducted by the Ponemon Institute and Globalscape…Read More
The current COVID-19 crisis spurred an increase in cyberattacks taking advantage of the sudden shift to virtual work and uncertainty surrounding health and safety information. Between March and May of this year, reported ransomware attacks increased 148% with global manufacturing, government, and internet providers the hardest hit1. Ransomware attacks are the new “go-to” for criminal…Read More
Cost-Efficient Storage Optimization Storage optimization may be defined as the process of moving data to the most efficient and cost-effective storage system for that data. Here are a few quick steps to cost effectively identify, manage, and protect your most important data. Step 1: Identify You can’t protect what you can’t see or identify, yet…Read More
These days, every business knows the threat of data breaches, with most, if not all, investing in proactive protection and reactive recovery measures to mitigate risks against data loss. But what about natural disasters? Hurricanes, flooding, earthquakes, fires, landslides – according to the National Oceanic and Atmospheric Administration, 2017 was the most expensive year on…Read More
Every IT professional knows they are up against exponential data growth and ever-increasing corporate demands that are pushing traditional data protection methods to their limit. The need to build a backup infrastructure to support unprecedented data growth and increasingly challenging SLAs is more important than ever. Visibility to the backups and control can be challenging.…Read More
Recently ZDNet reported that Microsoft’s long-awaited feature update introduced a bug which deleted user files in a way not easily recoverable. An underappreciated problem with modern computer systems is despite the layers of error detection, they remain unable to tell the user when files (or folders full of files) simply disappear. The cause can be…Read More
Video surveillance has advanced rapidly since CCTV was invented in 1942. However, the ongoing growth in the use of video surveillance brings with it new challenges for data storage, and as the role of CCTV grows ever more important, it is critical that it is managed and protected in the correct way. In particular, it’s…Read More
Although the cloud does bring a wealth of business benefits, it’s important to find the right ‘cloud balance’ for your business. By this we mean a complimentary architecture that supports both cloud and on-premises hardware to provide your business with the best of both worlds. Cloud computing offers flexibility and elasticity, but it’s also important…Read More
One of the questions that always comes up is what is the difference between Nexsan UnityTM n-Way Sync private cloud file sync and the snapshots and replication that are commonly used in storage today? It’s really about accessibility to the user so let me explain. Simply stated, snap and rep is an IT function. It…Read More
There’s been a lot of buzz about blockchain and how it plays in our digital world. Blockchain, originally devised for the digital currency Bitcoin, is getting a “bad rap” because bitcoins are the chosen currency by cybercriminals in ransomware attacks. The underlying technology that gives blockchain a variety of uses is the ability to allow…Read More