Skip to content

Samsung Offers 2TB SSD for Consumers

Samsung has doubled the size of its biggest consumer SSDs and is now selling a 2TB solid-state drive for your desktop computer, rivaling the capacity of more traditional spinning hard disk drives. The new 850 Evo ($799.99) comes with a five-year warranty and the 850 Pro SSD ($999.99) has a…

What Happens to Data After Recovery?

In every successful data recovery, the recovered contents from the affected drive are copied onto another device, often a hard drive. A new flash drive is appropriate for customers with smaller amounts of recovered data. This “target drive” is what we send to the customer in order to return their…

New Malware Implodes on Detection, Taking Your Data Down

An insidious computer virus that reacts violently when detected—destroying everything onboard—is now on the loose. Researchers from Cisco Systems Talos Group discovered the malware threat, called Rombertik. Like many other threats, this one is made up of particularly virulent code attached to a seemingly innocuous email. The bug is designed…

Recycle or Reuse?

After a hard drive is recovered by DriveSavers, our standard practice is to return the equipment to the user. We don’t repair the drives so if they are not working when they come to the lab, they leave in the same condition. When a customer doesn’t want their broken equipment…

Ways to Protect Your Company’s Tax Data

It’s tax time and the IRS is ready to receive your small business’ information from the past year. Can you guess who else is waiting for you to file, probably even more eagerly than the federal and state governments? Tax time is a busy and lucrative time for identity thieves…

Digital Guardian: Data Security Experts Answer: What is the Biggest Misconception Companies Have About Endpoint Security & Protection Tools?

Originally published by Digital Guardian. By Nate Lord Endpoint security is a method of protecting a central corporate network when it is being accessed through remote devices, or endpoints, such as PCs, laptops and other wireless mobile devices. And while endpoint security is a concept that isn’t exactly new by any…

Do It Yourself Data Recovery: Avoid Internet Remedies

When it comes to do-it-yourself data recovery tips, the Internet is full of home remedies. Many of these “tricks” were written years ago and only apply to “ancient” storage technology. Using these methods can damage the drive or its data, making it unrecoverable. Here’s a prime example of “myths” found on…

Back To Top
Search