Category security

Ransomware, Sabotage & Co.

Ransomware, Sabotage & Co:  The 5 biggest threats to your data – and how to protect yourself The amount of data generated and stored has increased dramatically in recent decades. Since almost all processes today are data-based, the loss of…

Criminals don’t play by the rules

Criminals don’t play by the rules There are all sorts of measures you can take to prevent hackers from gaining access to your system. These are sometimes complicated procedures. For example, there is a security structure, in which modifying protected…

Beware of software-based security!

Beware of software-based security! It may sound like an open door, but we don’t always realize it: virtual is synonymous with “not real” or “a reality created in memories of computers. Too often we think of “virtual” as reality, but…

The account of ransomware

The account of ransomware In our previous blog, we already discussed two major costs in the event of a successful ransomware attack. Because of downtime – the time you are not operational – costs quickly skyrocket, averaging 23 times the…

Subscribe for tips and info

We regularly write blogs on current topics from the world of digital storage technology. Sign up here to be notified about new blogs.