Uncategorized

Unusual Activity Detection

Unusual Activity Detection – Identifying and Flagging Security Threats 

Unusual Activity Detection – Identifying and Flagging Security Threats  Ransomware attacks have become rampant and commonplace.  As a data security measure, many enterprises worldwide have relied on cloud-based backups.  However, just backing up data is insufficient to thwart data loss risks posed by evolving cyber threats.  The biggest challenge is to detect an attack early. …

Unusual Activity Detection – Identifying and Flagging Security Threats  Read More »

GDPR and Disaster Recovery: 3-step guide to GDPR compliance

GDPR and Disaster Recovery: 3-step Guide to GDPR Compliance

GDPR and Disaster Recovery: 3-step Guide to GDPR Compliance Beckoning the new era of data privacy, General Data Protection Regulation, the first major reform in data protection regulations in 20 years, will now dictate radical changes to the way digital businesses treat the private information of their subjects. In first, the new rules, as directed by …

GDPR and Disaster Recovery: 3-step Guide to GDPR Compliance Read More »

Is-your-SFTP-based-file-transfer-good-enough-Banner-Image (1)

Is Your SFTP Server-Based File Transfer Secure Enough?

Is Your SFTP Server-Based File Transfer Secure Enough? What is secure FTP? Secure FTP (SFTP) is among the most widely used methods for file sharing. It is appealing because it is simple to use and often free or very inexpensive. Over the years, SFTP has come to be viewed as a “good enough” solution for transfer and …

Is Your SFTP Server-Based File Transfer Secure Enough? Read More »

Encryption key management

Encryption Key Management – What You Need to Know

Encryption Key Management – What You Need to Know Encryption key management is a significantly important data protection aspect to be understood and practiced to ensure critical files are indecipherable to attackers. Conventional file-sharing protocols encrypt data only in transit but not at rest and offer no control over the receiver’s actions.  Mere password-protected files and cloud …

Encryption Key Management – What You Need to Know Read More »

Conversational AI to Drive Data Backup

Using Conversational AI to Drive Data Backup Forward

Using Conversational AI to Drive Data Backup Forward It’s hard to avoid the topic of artificial intelligence (AI) and machine learning algorithms in any conversation these days. Every vendor, business, thought leader, and their cousin are talking about it and trying to showcase either how they plan to use it or the importance of AI/ML to the greater …

Using Conversational AI to Drive Data Backup Forward Read More »

Banner-Making-Data-Protection-Cost-Effective

Making Data Protection Cost-Effective

Making Data Protection Cost-Effective A sub-optimal data protection strategy and an ad-hoc backup process can prove to be a business’ Achilles heel.  The most common causes for data loss are accidental data deletion, malicious insider deletion, ransomware attacks, and device losses or accidents. Each occurrence by itself has the potential to hamper business continuity, but collectively pose …

Making Data Protection Cost-Effective Read More »

Data Resiliency OR Data Protection

Data Resiliency or Data Protection! Which Should You Choose?

Data Resiliency or Data Protection! Which Should You Choose? Data resiliency and data protection are terms that bear a close resemblance and can be easily be confused. While both seemingly achieve the same goal – they serve customers very differently.  What is Data Resiliency? Resiliency refers to data’s ability to “spring back” in situations where it …

Data Resiliency or Data Protection! Which Should You Choose? Read More »

Litigation Hold office 365

How Not to Use Litigation Hold With Office 365

How Not to Use Litigation Hold With Office 365 Do not turn ON Litigation Hold on all your email and documents without involving your legal team and thinking through the consequences. After we launched our Cloud- Cloud Backup solution for Office 365, I’ve been having conversations with several customers about the importance of protecting cloud …

How Not to Use Litigation Hold With Office 365 Read More »

office 365 archive

Why You Need to Look Beyond Built-in Office 365 Archive

Why You Need to Look Beyond Built-in Office 365 Archive Office 365 email archiving Office 365 email archiving may be adequate for basic use cases – but can get overwhelmed pretty quickly.   Customers with Microsoft Office 365 E3 licenses and above are essentially led to believe they have an unlimited mailbox size.  In reality, they …

Why You Need to Look Beyond Built-in Office 365 Archive Read More »

How Safe is Onedrive Against Ransomware Attack?

How Safe is Onedrive Against Ransomware Attack? A number of businesses of late have come to rely on OneDrive for Business as their sole means of endpoint data protection. With Microsoft 365 becoming widely prevalent, businesses are viewing OneDrive as ‘free’ endpoint backup. Some have even gone to the extent of discarding their commercial-grade endpoint backup …

How Safe is Onedrive Against Ransomware Attack? Read More »

Scroll to Top