Skip to content

Data Recovery and the iPhone 7

DriveSavers was the first company to recover data from a failed iPhone and we’re ready to help if you lose anything important on the new iPhone 7 and iPhone 7 Plus that were released in September. Our engineers have already torn apart the new phone to document all of the…

Don’t Get Caught by SMS Text Phishing

By Michael Hall, Chief Information Security Officer If you’re a regular reader of our blog, you are already familiar with phishing emails from an article we posted earlier this year, Don’t Get Caught by Phishing or Other Email Attacks. Phishing is a tactic used by criminals to disguise themselves in…

Disaster Preparedness Data Safety Tips

By Mike Cobb, Director of Engineering Keeping your data safe and out of harm’s way can make all the difference when recovering from a disaster. Accounting and project files can get a business back up and running. Family photos and videos can help bring back laughter and a sense of…

Flash Memory Safety Tips for Digital Photographers

By Mike Cobb, Director of Engineering Digital photography offers a fast and convenient way for photographers to accomplish their work. However, with convenience comes the extra task of managing camera cards and unlimited numbers of digital images. Add to the list the very real possibility of a hard drive crash or…

Is Pokémon Go a New Target for Hackers?

By Mike Cobb, Director of Engineering Pokémon Go, the smartphone game that became an overnight worldwide sensation, may be more than a cute time-waster. It could provide cybercriminals with an entry point to your business and personal files. Corporate security directors were already wringing their hands over employees who mix…

eDiscovery and Forensic Techniques Behind Clinton Email Investigation

By Rene Novoa, Manager of eDiscovery and Digital Forensics The recent FBI probe into Democratic presidential nominee Hillary Clinton’s private email likely mirrored eDiscovery tactics used by DriveSavers when processing electronically stored information (ESI) and digital evidence for law firms, corporations, government agencies, educational institutions and individuals. As an eDiscovery…

RAID Systems Are Not Infallible

By Mike Cobb, Director of Engineer Many businesses and organizations of all sizes rely on redundant arrays of independent disks (RAIDs). These systems distribute data and parity across a set of disks, protecting files held on the array against the failure of any individual disk. Unfortunately, even these redundant systems…

Symptoms of Ransomware Infection

By Mike Cobb, Director of Engineering Ransomware is a quickly growing problem. There were nearly 2,500 cases of ransomware reported to the FBI’s Internet Crime Complaint Center (IC3) in 2015 alone, and victims paid over 1.6 million dollars to unlock their data. 2016 is shaping up to show even larger…

Little Hits, Big Hacks

By Michael Hall, Chief Information Security Officer If you operate a small company, you may not think your information is valuable enough to be hacked, but you’re wrong. Hackers love small businesses because many do not properly protect their data, making them easier targets to hit. If you are not…

Back To Top
Search