Skip to content

Four Ways to Protect Yourself from a Data Breach

Data breaches have become an almost predictable problem with banks and major retailers. Now a couple of telephone companies have been fined $10 million for violating security laws designed to protect the confidentiality of customers proprietary information (PI). The customer names, Social Security numbers, birth dates, addresses, driver’s license numbers…

SSD: What Happens When System Area Corruption Occurs

Scenario: System Area Corruption There are different types of corruption that can occur in an SSD. In this article, the specific type we will be discussing is more commonly known as “system area corruption.” We’re all familiar with operating systems (OS) and file systems. What you may not be aware…

Medical Data: Tempting Target for Cyber Theft

Data breaches are a fact of life nowadays, so it’s not exactly surprising to learn of another hack in which more than 4.5 million medical patient records were recently stolen from Community Health, a Tennessee health care company. One of the largest hospital groups in the country, Community Health has…

Easy Does It With Apple iOS8 Upgrade

The new iOS8 operating system for Apple’s lineup of portable computing devices is available for download on September 17. Before making the move, here’s what you should do to safely complete the upgrade process. First, if you haven’t already done so, make a backup copy of all data on every…

CD Rot: A Diskaster in the Making

CD rot sounds like yet another horrible disease du jour, but it’s not quite that. It’s what can happen over time to the recorded contents of compact disks and it’s not reversible. The Library of Congress, which maintains copies of important commercial recordings and printed materials, is struggling with the…

SSD: What Happens When Files are Accidentally Deleted

Scenario: Data Deletion Data deletion occurs when a user deletes data and then empties the recycle/trash bin. TRIM Command In order to maintain optimal performance, all modern solid-state drives utilize the TRIM command. When enabled, this command executes automatically to delete and reset data that has been “Trashed” or “Recycled” and prepare…

Trends in Security of Data Recovery Operations

Using an Unscrupulous Data Recovery Vendor Can Result in Loss or Theft of Sensitive and Confidential Information (Novato, CA – January 10, 2012) – DriveSavers Data Recovery, the worldwide leader in data recovery services, announced today that the Ponemon Institute, a privacy and information management research firm, identifies in its second annual study, Trends in…

HIP, HIP, HIPAA

Officially, it’s called the Health Insurance Portability and Accountability Act of 1996, but it’s usually shortened to just the letters HIPAA. The Security Rule specifies a series of administrative, physical and technical safeguards for covered entities and their business associates to use to assure the confidentiality, integrity and availability of electronic…

CryptoLocker Virus Thwarted

If you have been hit by the CryptoLocker virus, now there’s hope you can retrieve your files. Researchers have turned the tables on suspected cyber criminals from Russia who used the CryptoLocker virus to extort millions from unwitting computer users all over the world. FireEye and Fox-IT, two technology firms,…

Back To Top
Search