Skip to content

CNN Video: Deadly Plane Crash

Technology exists that can recover data from any device, no matter how damaged. Chris Bross, DriveSavers Chief Technology Officer (CTO): Anything that stores digital data we can recover. CNN Reporter: The recovery of cellphone video from a crash site begins in a place like this Jim Alcott, DriveSavers Data Recovery/Forensic Engineer: I’m going…

Recycle or Reuse?

After a hard drive is recovered by DriveSavers, our standard practice is to return the equipment to the user. We don’t repair the drives so if they are not working when they come to the lab, they leave in the same condition. When a customer doesn’t want their broken equipment…

Easing eDiscovery Review Costs

Originally published on Legaltech news. Privilege review typically involves attorneys meticulously inspecting collected documents—but it doesn’t have to. Bill Piwonka, Law Technology News International Data Corporation estimates the volume of digital data created globally will grow 40 percent to 50 percent a year, reaching 40 zettabytes by 2020. Managing these…

Microscopic Particles Can Cause Huge Damage

Originally published on DriveSavers Data Recovery. When a data recovery service provider is needed, be sure the facility has the proper industry certifications. Otherwise, the data you are missing may be at a much higher risk of being unrecoverable or even permanently destroyed. The Dangers of Microscopic Particles in Data…

Ways to Protect Your Company’s Tax Data

It’s tax time and the IRS is ready to receive your small business’ information from the past year. Can you guess who else is waiting for you to file, probably even more eagerly than the federal and state governments? Tax time is a busy and lucrative time for identity thieves…

Digital Guardian: Data Security Experts Answer: What is the Biggest Misconception Companies Have About Endpoint Security & Protection Tools?

Originally published by Digital Guardian. By Nate Lord Endpoint security is a method of protecting a central corporate network when it is being accessed through remote devices, or endpoints, such as PCs, laptops and other wireless mobile devices. And while endpoint security is a concept that isn’t exactly new by any…

Back To Top