Skip to content

What to Expect from Data Recovery Part 1: Initial Call

What should you do when your hard drive fails? If you are one of the unfortunate many who haven’t taken precautions with a backup, then you’re most likely going to need professional help. That’s especially true if the data in question is valuable and hard or impossible to recreate. There…

Rough Weather Threatens Data

When severe weather threatens your home, school or business this spring, don’t be caught unprepared. As temperatures rise and rain clouds gather, the resulting storms, floods and other damaging impacts of bad weather pose a very real threat to any unprotected data storage device. Defend Your Data Be prepared to…

SSD: What Happens When Connections Fail

Scenario: Unknown PCB (printed circuit board) Failure A solid-state drive (SSD) is simply a printed circuit board (PCB) with typically 3 basic types of chips soldered to it; DRAM, NAND and a controller (aka the “brain”). Each chip must be perfectly aligned with its specific location on the PCB, and…

Holiday Computer Safety Tips

If you are going to be away from home or shutting down your business during the holidays, here are some tips to keep your important data safe from harm’s way. Back Up First and foremost, make sure you have everything important backed up. A backup is just a copy, stored…

Customer Success Story: Can’t Keep a Good Kid Down

In many ways, Malcolm Foggio is like most other teenage boys. He enjoys soccer. Listens to popular music. Likes ice cream. But, unlike others his age, Malcolm started his own non-profit foundation, at age 11, to fight childhood cancer. Malcolm is a cancer survivor who was diagnosed with a serious…

Four Ways to Protect Yourself from a Data Breach

Data breaches have become an almost predictable problem with banks and major retailers. Now a couple of telephone companies have been fined $10 million for violating security laws designed to protect the confidentiality of customers proprietary information (PI). The customer names, Social Security numbers, birth dates, addresses, driver’s license numbers…

SSD: What Happens When System Area Corruption Occurs

Scenario: System Area Corruption There are different types of corruption that can occur in an SSD. In this article, the specific type we will be discussing is more commonly known as “system area corruption.” We’re all familiar with operating systems (OS) and file systems. What you may not be aware…

Medical Data: Tempting Target for Cyber Theft

Data breaches are a fact of life nowadays, so it’s not exactly surprising to learn of another hack in which more than 4.5 million medical patient records were recently stolen from Community Health, a Tennessee health care company. One of the largest hospital groups in the country, Community Health has…

Easy Does It With Apple iOS8 Upgrade

The new iOS8 operating system for Apple’s lineup of portable computing devices is available for download on September 17. Before making the move, here’s what you should do to safely complete the upgrade process. First, if you haven’t already done so, make a backup copy of all data on every…

Back To Top
Search