We use cookies on our website. By continuing to use this site, you agree to our cookie policy - Okay, Got it.

RenovoData - The Data Protection Blog

about renovodata

Data Protection

RenovoData Appears in McLeod's "The Dispatch"

Published December 08, 2020 by

Navigating the new normalRenovoData appeared in the December 2020 edition of "The Dispatch" by McLeod Software. Read on...


 


 

Navigating the New Normal: How Does it Look for Your Company?

Published November 14, 2020 by

Navigating the new normalA recent article, “Navigating the New Normal: How Does it Look for Your Company?" was published in 3PL Perspectives. It discusses the importance of looking at what we have learned about conducting business during a pandemic. Read on...


 


 

Online Security for a Remote Workforce

Published August 03, 2020 by

Online Security for a Remote WorkkforceRenovoData was recently featured in an article about Online Security for a Remote Workforce in 3PL Perspectives, the third-party logistics magazine provided by the Transportation Intermediaries Association (TIA). Read the article...


 


 

The New Normal...How Does it Look for Your Company?

Published July 06, 2020 by

The The new normal...how does it look for your company? Despite the downsides of the Covid-19 pandemic, companies a rare opportunity for innovation, growth, and improvement. Learn more...


 


 

Online Security for a Remote Landscape

Published June 28, 2020 by

Online security for remote work at home Online security for a remote landscape. The growth of remote workforces has weakened many organizations’ normal protections, resulting in a new generation of malware. New varieties of fraudulent clickbait appear in the form of fictitious cures and bogus pandemic services, along with the usual scams. Learn more about some steps you can take while your employees work remotely.


 


 

Know Your Security Vulnerabilities: The Danger Is in the Details

Published May 04, 2020 by

security vulnerabilitiesRenovoData was featured in the 3PL Perspectives publication (May 2020 Edition) with this article: Know Your Security Vulnerabilities: The Danger is in the Details"The Logistics Journal is a third-party logistics magazine provided by the Transportation Intermediaries Association. Read on...


 


 

Elements of a Business Continuity Plan in the Time of Pandemic

Published April 24, 2020 by

Elements of a Business Continuity Plan in the Time of PandemicThe COVID-19 outbreak may have caught the world off guard and will end and one day. The actions your company takes now will affect its future. For Guidance in planning your company's powerful response to the pandemic, please click on the link.


 


 

When Disaster Strikes, Don’t Let Fight-or-Flight Interfere with Your Recovery.

Published February 12, 2020 by

Don't reinvent the cybersecurity wheel

When emergencies arise, people are thrust into fight-or-flight mode. At these times the speed, accuracy, and thoroughness of the team’s responses can mean the difference between a company’s survival and its destruction. Learn what to do when hacker assaults, weather events, or other catastrophes threaten your data and systems.


 


 

You Don't Need to Reinvent the Security Wheel

Published January 30, 2020 by

Don't reinvent the cybersecurity wheelEvery organization with an online presence is at risk of a cyberattack and effective protection against it must be well-planned out. You don’t have to reinvent the security wheel. Establish standards that will guide you.To learn more about how to protect your company click on the link.


 


 

Cloud Solutions are Not Created Equal. Differences Include Security, Privacy, Data Mining, and More

Published January 06, 2020 by

Cloud Solutions

RenovoData was featured in the 3PL Perspectives publication (December 2019 Edition) with this article: Cloud Solutions Are Not Created Equal. Differences Include Security, Privacy, Data Mining, and More...".  3PL Perspectives is a third-party logistics magazine provided by the Transportation Intermediaries Association. Read on...


 


 

Backup and Disaster Recovery - an Ideal Use Case for the Cloud

Published October 15, 2019 by

Backup and Disaster Recovery - an Ideal Use Case for the CloudEffective data backup and disaster recovery are imperative in our current technological environment. When disasters strike, whether through malicious cyber-attacks, natural events, or unforeseen accidents, systems and backed-up data need to be recovered quickly if the company is to avoid losses of productivity, performance, and reputation. Read more on the ideal use case for cloud...


 


 

The Cloud Can’t Eliminate Your Responsibility for Data Protection (3PL Perspectives September 2019)

Published September 13, 2019 by

cloud blog postRenovoData was featured in the 3PL Perspectives publication (September 2019 Edition) with this article: The Cloud Can’t Eliminate Your Responsibility for Data Protection.  3PL Perspectives is a third-party logistics magazine provided by the Transportation Intermediaries Association. Read on...


 


 

The Pros and Cons to Single Sign-On (SSO)

Published January 17, 2019 by

single sign onSingle sign-on (SSO) is an important element in the complex structure of an effective security program. It is a service that gives a user access to multiple network destinations by entering only one login, one username, and one password. Simplifying the login process streamlines workflow and adds a layer of safety by reducing .... [Read More].


 


 

Digital Transformation Offers Opportunities...

Published October 23, 2018 by

Digital TransformationThe term digital transformation represents today’s continuous proliferation of digital technologies, and it also points to the speed with which they are being integrated into every area of activity. On a global scale, this steady acceleration is remaking human society, strongly affecting the ways we do business. Read More.


 


 

Even with the cloud, data protection is your responsibility

Published June 14, 2018 by

Head in the cloudsIn recent years, the cloud has become a major part of the IT landscape, bringing many benefits and a wide variety of options. In addition to virtually unlimited data storage, the cloud imparts improvements in speed, availability and user mobility. It carries significant financial savings as well, including cost cuts, on-demand capacity, and reduction of resources previously allocated to infrastructure and operations. Read the full Story.


 


 

Blockchain makes big promises – and raises big questions

Published January 23, 2018 by

blockchainAre you aware of the challenges of Blockchain technology, in addition to how it affects your data and business continuity?Learn More...


 


 

Cyber Threats are multiplying rapidly.

Published November 07, 2017 by

Cyber SecurityYou can protect your Data with these three steps.

Cyber Security Threats are nothing new, but the recent explosive growth has become a global concern. News reports of such attacks have become commonplace. The September 20, 2017 issue of PC Magazine states that In the first half of 2017, there were 1.9 billion data items compromised worldwide, compared to 1.38 billion for the entire year of 2016.

While cyber-attacks against major corporations and governments make headlines, upwards of 70% of these breaches target small businesses, so every organization with an online presence is vulnerable. Learn (a lot) more...


 


 

The Internet of Things opens up exciting new possibilities…and raises new security alarms.

Published September 12, 2017 by

internet of thingsThe Internet of Things has been with us for a while, starting with Internet applications for phones, cars and personal devices. As IoT applications multiply, they are revolutionizing the IT landscape.

Founded on widespread wireless availability, IoT applications consist of several components ... Read More and get our recommendations on staying ahead of the expanding opportunities hackers are finding.


 


 

Cloudy Thinking about Data Backup - Article Featured in the Logistics Journal, June 2017

Published July 05, 2017 by

Logistics Journal front cover April 2017Last month (June 2017), RenovoData were once again featured in The Logistics Journal. The article provides expert-level detail on helping 3PL and Trucking Companies to get a grasp on the realities of data backup and to avoid the traps of common misconceptions that often circulate. Learn more.


 


 

With RaaS (Ransomware as a Service), anyone can hold your data hostage

Published June 15, 2017 by

New do-it-yourself cyber-extortion kits make it easy.

ransomwareSince its invention in the mid-2000s, ransomware has become the world’s premier cyber-security threat. Typically gaining entry to a system via bogus emails or notifications, this malware enables criminals to capture a system’s data and demand payment for its release.  Read More...


 


 

What's the Right Disaster Recovery Solution for You - as Featured in the Logistics Journal, December 2016

Published February 14, 2017 by

RenovoData disaster recovery solution articleIn December 2016, RenovoData were featured in the leading publication from the Transport Intermediaries Association, The Logistics Journal. The article provides expert-level detail on helping 3PL and Trucking Companies to choose the right disaster recovery solution.  Learn more and read the full article


 


 

Network Security for 3PL and Trucking Companies - as Featured in the Logistics Journal, November 2016

Published January 10, 2017 by

RenovoData network securityarticleIn November 2016, RenovoData were once again featured in the leading publication from the Transport Intermediaries Association, The Logistics Journal.  The article, authored by our own Data Protection Expert, Chuck Cook, provides expert-level detail on Network Security (Simple Concept, Complex Reality) including security-risk lingo (vulnerabilities, threats, breaches, etc), planning a security program, reduction of human error, what to protect, knowing your enemies, and their weapons!  And, of course the importance and value of testing.  Learn more and read the full article


 


 

The security onion - A single entity with many layers.

Published October 27, 2016 by

security onionEffective security demands the strongest possible protective measures, encompassing every aspect of the network. Although technical components are separate items and the organization itself comprises various aspects of the security process, all are bound together to form a whole, like the layers of an onion. Both technical and human components can be at risk. Only by implementing universal security policies and procedures can the entire system be safeguarded.  Learn More.


 


 

Eliminate Single Points of Failure: And Don’t Overlook the Cloud

Published October 05, 2016 by

single point of failureData protection is nothing less than business protection, and to be effective it must be as nearly invincible as possible. Yet even the most technically sophisticated organizations, those familiar with the fine points of data backup, can make a particularly dangerous mistake: not noticing a single point of failure. This means any significant part of a system that is without redundancy. If one major component ceases to function, it can set off a cascade of collapse and the system can stop cold.


 


 

Who needs disaster recovery if you’ve got data backup? They’re the same thing, right? No, they're not.

Published July 19, 2016 by

data back up vs data recoveryData backup is a vital component of a solid disaster recovery plan, but is only one part. Backup software is intended to ensure against data loss, but may not always perform flawlessly and does nothing to protect the operating system environment. Even with the best backup software and the most reliable offsite facility, the overall environment is vulnerable to severe damage unless a thorough disaster recovery plan is in place. Read more about the vital differences between data backup and recovery.


 


 

The Mythology of Data Backup

Published July 05, 2016 by

mythology of data protectionAs ubiquitous as sophisticated data backup has become, misconceptions about it are everywhere. These include widespread and mistaken beliefs about how backup works, what solutions are available, differences between vendors, and the risks companies run when choosing, installing and working with backup solutions. Two main reasons are the fact that backup technology never stops evolving, and the ballooning threat of hacker sabotage.  Read More...


 


 

Guarding Against Ransomware: Some Essentials

Published May 19, 2016 by

malware essentialsThe objective of ransomware is simple: using invasive encryption to extort money by holding an organization’s network and data hostage. But ransomware technology is far from simple, and it can inflict severe damage on businesses and institutions of any size.

Read "Guarding Against Ransomware: Some Essentials" now.


 


 

Essential Data and Systems Protection for the Modern 3PL & Trucking Companies - as Featured in the Logistics Journal, April 2016

Published May 12, 2016 by

logistics journal 2016Over the last decade, cloud backup and recovery options have emerged as a secure, cost-effective and reliable method of protecting increasing amounts of data a company generates daily.  However, some companies may have lulled themselves into a false sense of security as the measures they have put in place, while a step in the right direction, cannot fully protect all business functions in the event of a disaster or data loss event.  Read More.


 


 

Factors to Consider When Switching From One Cloud Backup Service To Another

Published April 12, 2016 by

switching back up serviceOver time, you may find that your current cloud-storage system is no longer meeting your needs as well as it had in the past. Perhaps you want better pricing or more features or a higher level of service. Whatever it is that is motivating you to shop around, you can take comfort in the knowledge that there are a great many options in today’s marketplace.


 


 

Ransomware: The Growing Threat

Published March 29, 2016 by

ransomwareBack in February, it was reported that Hollywood Presbyterian Hospital had become the latest high-profile victim of a cyber-attack.  Hackers had gained control of the hospital’s network and encrypted all patient records.... In truth, any company can be a victim of a ransomware attack.  All it takes, is a seemingly harmless or everyday email with an attachment.  So, what can corporations and institutions do to safeguard against these kinds of attacks?  Learn More.


 


 

Data Backup Versus Server Recovery Solutions

Published March 01, 2016 by

Many business owners and “less technical” people in management think “data backups” are enough to protect their organization.  But when an outage occurs from equipment failure the recovery can be painful and take far longer than expected.  Read more.


 


 

Online Resources to Help Make Web Browsing Safer

Published February 08, 2016 by

laptop

The prevalence of online security threats to data or identity lurk in the back of many internet users’ minds. The suspect could be a link in an email from an unknown, or at least unfamiliar source. Or danger may come in the form of a “helpful” popup which carries an ominous message to proceed at your own risk. Fortunately, there are several online resources which can help make web browsing safer.  Read More.


 


 

I lost my smartphone, what can I do to protect myself against fraud?

Published February 01, 2016 by

lost smart phone need help

In today’s world, the use of smart devices is widespread across all economic levels of society.  So too, the theft of smartphones and other small portable devices is on the rise.  Whether we are talking, texting or using application data, the fact is that our smartphones and devices hold a lot of personal information.  So, what actions can a user take now to limit their liability and exposure to fraud or identity theft in the event their device is lost or stolen? Read More.


 


 

How to Identify Fake Antivirus and What to Do so it Doesn’t Happen to Your Company

Published January 13, 2016 by

The first thing to know about fake antivirus is that its primary purpose is to separate you from your money.  For the most part, cybercriminals distribute fake antivirus programs via Internet ads and popups and sometimes through poisoned search results. It is often referred to as “scareware” and with good reason!  However, through awareness and vigilance, you can greatly reduce the risk that antivirus scams could invade your company’s network. Read More.


 


 

What You and Your Employees Should Know About Malware, Spyware and Adware

Published December 21, 2015 by

Malware, in various forms, has been around a long, long time.  Once one variant is defeated another one is created. Criminal elements use malware to steal information, ransom money from victims and generally create chaos. Dealing with malware requires awareness, vigilance and proper protection. Read More.


 


 

Why Patching is Important

Published December 08, 2015 by

What is patching? Patching is another term for software updates.  According to Wikipedia, a patch is “a piece of software designed to update a computer program or its supporting data, to fix or improve it.”  From time to time, you may see an icon pop up prompting you to update Java or Adobe, etc. Or you’ll go to shut down your computer but your operating system may have other ideas... Read More.


 


 

How Online Fraud Targets Small Business

Published November 24, 2015 by

This post is part of a series of articles about how small business owners can prevent scams and fraud in the workplace. Today, we look at online fraud, specifically, ‘Phishing’. Phishing can be defined as “the activity of defrauding an online account holder of financial information by posing as a legitimate company.” Read More.


 


 

A Time to Thank You

Published November 17, 2015 by

Over the course of the year, we are all busy working on our tasks, projects and initiatives. As the Holiday Season approaches, we cannot help but to take a moment to be thankful for the opportunity to be your data protection partner... Read More.


 


 

How to Create a Secure Password

Published September 09, 2015 by

How to create a secure password for business can be a little tricky these days. With Fortune 500 companies like Sony and or health care giants like Anthem Blue Cross being hacked on a regular basis, how can you ensure that your information is locked down tight?  Read More...


 


 

Key Steps a Business should take to improve their IT Security Posture

Published August 24, 2015 by

Security is not just for banks and big businesses.  It’s for all organizations, big or small.  Over the years, we’ve found a large number of organizations that could have prevented a data loss or data breach event from occurring by taking a few precautions. Read More.


 


 

Data Protection and Disaster Recovery for the Paperless Transport Company - as Featured in the Logistics Journal, July 2015

Published August 20, 2015 by

Over the last decade, cloud  backup, recovery, and restoration options have emerged as a secure, cost­ effective, and reliable method of protecting the ever increasing  amounts  of  data  a  company generates daily. However, switching to a cloud-based backup system is a serious proposition that requires a clear understanding of how such a solution will integrate into the company's existing infrastructure.


 


 

How to Create a Disaster Plan for Your Business

Published August 17, 2015 by

What would happen to your business if a disaster rendered your office building unusable?  What about a data loss event that caused your company’s data to be lost or unavailable? Do you have a contingency plan to make sure your business is protected?  These plans can be as complex or simple as you need them to be...  Read More.


 


 

Email Backup: Why You Should Have One

Published July 22, 2015 by

If you’re running a business, losing your emails, conversations with clients, and the ability to interact with the world outside of your company can bring your business to a screeching halt. Now if your email goes down and you lose your emails, it can feel like you’re aboard the Titanic and it’s going down- fast. So how do you prevent a massive loss? And how do you make sure that when you backup your data you’re also backing up your email?  Read More.


 


 

Endpoint Data Security: An Important Issue Worthy of a Second Look

Published July 01, 2015 by

The widespread and ubiquitous integration of smartphones and tablets into our daily lives has created an environment where hackers are taking every opportunity to gain access and steal user data. The common perception is that these smartphones and other mobile devices are secure by default – this is a potentially dangerous and costly misconception. Read More.


 


 

Is Your Data Leaking?

Published June 17, 2015 by

In today’s business environment, everyone knows to watch out for hackers. However, data leakage and loss from negligent file sharing is becoming just as significant a risk as data theft.  Popular applications like Dropbox and Box do increase productivity and make collaboration easier. Read More.


 


 

Single Point of Failure – What is it? Why it Matters…

Published June 10, 2015 by

What is a single point of failure? If you are running your company’s website from a single server and that server goes down, you are looking at a single point of failure.  If such a risk exists for your company, you will want to take steps immediately to reduce that risk. Read More.


 


 

End of Support – What that means to your business

Published June 03, 2015 by

Are you still using Windows Server 2003? Now is the time to upgrade. Mainstream support ended on July 13, 2010 and extended support will end soon - on July 14, 2015. Old, unsupported operating systems do pose an increased risk for data breach. Read More.


 


 

An Overview of Data Protection for the Small Business

Published May 27, 2015 by

Did you know? 71% of security breaches target small businesses. In light of this, for this blog post we will focus on the following aspects of data protection for small businesses... Read More.


 


 

Why Protecting Email is More Than Using a Secure Password

Published May 20, 2015 by

Imagine that you are in your car and driving to work. Suddenly, there is an urgent call from your assistant telling you that your company’s website has been attacked by hackers. Visitors to your corporate site are not only seeing the messages and images posted by hackers, but screenshots of private emails sent to your company posted to Twitter for all the world to see.  This is a situation that Lenovo sadly faced back in February of this year. Read More.


 


 

Insider Attack: How Do You Protect Your Company Data?

Published May 13, 2015 by

Having a solid backup and recovery strategy is vital for today’s business environment. Traditionally, focus has been placed on external threats and natural disasters. However, recent data breaches have shown us the wisdom of recognizing potential weaknesses and threats from the inside. Read More.


 


 

Factors of Cloud-based Data Backup and Recovery to Consider for Legal Industry Professionals

Published May 06, 2015 by

Advances in technology, most notably cloud-based services, are changing how companies do business.  The legal industry, though not early adopters of cloud-based data backup and recovery applications, are now rapidly “coming up to speed”.  Included below are several questions to consider for moving the legal industry to the cloud... Read More.


 


 

Lessons Learned from the Recent Anthem Cyber-Attack

Published April 15, 2015 by

Taking a look at the recent cyber-attack on health insurance giant Anthem, there seems to be a consensus that the institution was particularly vulnerable due to a lack of internal encryption.  Another point to consider is that this industry is slower to adopt measures like... Read More.


 


 

Why File Sync/Share is Not Endpoint Backup

Published April 08, 2015 by

File sharing is widespread and rapidly becoming “business as usual” for many companies and corporations.  The ability to share files with co-workers increases productivity and ultimately reduces costs. Read More.


 


 

Ransomware is back in the news!

Published March 11, 2015 by

Last year, the FBI in the United States, and other authorities world-wide, took down the infrastructure used to distribute CryptoLocker—thereby disrupting the effectiveness of the malware.  Soon after, new breeds of ransomware were born. Read More.


 


 

Best Practices for Passwords

Published March 04, 2015 by

At RenovoData, we care about our customers, especially keeping their data safe and protected.  We work tirelessly to ensure that crucial business data is backed up and recoverable in the event of a disaster or data loss event. Read More.


 


 

The Challenges of Virtualization Backup and Recovery

Published February 25, 2015 by

At RenovoData, we believe that treating VM data protection separately from your overall data protection plan is not only a replication of effort but an inefficient use of resources. The backup, recovery and protection of data on virtual machines should be integrated into an enterprise-wide data backup strategy and practice. Read More.


 


 

Factors to Consider When Developing a Data Retention Policy for Your Business

Published February 18, 2015 by

Every company should have an electronic data retention policy which is documented.  Also, it is important to consider the long-term consequences of implementing a data retention policy. Read More.


 


 

10 Must-Haves for Your Business Continuity/Disaster Recovery Plan

Published February 11, 2015 by

Think of your Business Continuity/Disaster Recovery Plan like an insurance policy. Here is our list of 10 must-haves for your BC/DR plan… Read More.


 


 

Why Backup is Not Disaster Recovery

Published February 04, 2015 by

While most companies today backup at least some of their data, many of these organizations do not have a solid disaster recovery plan. Why is that? Some believe… Read More.


 


 

Recovery is EVERYTHING!

Published January 28, 2015 by

Organizations are backing up loads of data. With emerging trends such as big data and ongoing regulatory compliance pressure, data volumes have skyrocketed. This trend is projected to… Read More.


 


 

The Elephant in the Room: Endpoint Data Backup

Published January 14, 2015 by

If your company has employees that use a laptop, smartphone or tablet, then you’ve got endpoint data. Traditionally, the responsibility of backing up… Read More


 


 

What Are the Financial Advantages of a Cloud Backup Service?

Published January 07, 2015 by

I’m here to tell you that the financial advantages of RenovoData’s cloud backup service go beyond lower total cost of ownership. First, let’s recap some of the basics… Read More


 


 

2014 Year End Review: Cryptolocker

Published December 31, 2014 by

What is CryptoLocker? If you are asking that question, then you may be lucky enough not to have been affected by this insidious bit of code. Read More...

 


 


 

How is My Company's Data Stored in the Cloud?

Published December 03, 2014 by

In general, cloud storage systems rely on hundreds of data servers. Occasionally, computers experience downtime due to repairs or maintenance… Read More...


 


 

How Does a Cloud Backup System Guarantee My Data is Being Transferred Securely?

Published November 12, 2014 by

The first concept to understand with regards to secure data transfer is that of encryption. Encryption, is the process of changing information in such a way as to make it unreadable by anyone except those possessing the key. Read More...


 


 

How Does Data Recovery Typically Operate with a Cloud Model?

Published October 29, 2014 by

In the past, data recovery has relied on tapes to backup and protect a company’s vital data.  Let’s recap some of the major problems with the tape backup: Read More...


 


 

Looking for older posts? View our Archives