RenovoData - The Data Protection Blog

about renovodata

Pay up or we'll kill your data

Published June 02, 2016 by

Ransomware pay up or we kill your dataA sophisticated new generation of ransomware is rolling across North America.  It doesn’t just steal your information and wreak havoc with your IT systems.  It steals your money.

Several versions of ransomware are at large. They go by different names, such as Crypto locker, Crypto wall and others. They usually propagate as Trojans, entering networks via innocent-looking links in emails or innocuous messages from unknown websites.

Without up-to-date anti-virus and malware protection installed on every PC and laptop connected to your network, you are vulnerable to attack.  Read More.



Guarding Against Ransomware: Some Essentials

Published May 19, 2016 by

malware essentialsThe objective of ransomware is simple: using invasive encryption to extort money by holding an organization’s network and data hostage. But ransomware technology is far from simple, and it can inflict severe damage on businesses and institutions of any size.

Read "Guarding Against Ransomware: Some Essentials" now.



Essential Data and Systems Protection for the Modern 3PL & Trucking Companies - as Featured in the Logistics Journal, April 2016

Published May 12, 2016 by

logistics journal 2016Over the last decade, cloud backup and recovery options have emerged as a secure, cost-effective and reliable method of protecting increasing amounts of data a company generates daily.  However, some companies may have lulled themselves into a false sense of security as the measures they have put in place, while a step in the right direction, cannot fully protect all business functions in the event of a disaster or data loss event.  Read More.



Why does DRaaS matter, and how do you achieve it?

Published April 26, 2016 by

high availabilityThink of the ways your business relies on IT. Manufacturing and inventory, internal and external communications, sales, delivery, marketing, purchasing, HR, supply chain and transactions of every kind – the list goes on. Add to that the IT systems that perform tasks that did not exist before automation, and it goes without saying that virtually all these are connected to the Internet. Learn More about High Availability and how you can achieve it.



Factors to Consider When Switching From One Cloud Backup Service To Another

Published April 12, 2016 by

switching back up serviceOver time, you may find that your current cloud-storage system is no longer meeting your needs as well as it had in the past. Perhaps you want better pricing or more features or a higher level of service. Whatever it is that is motivating you to shop around, you can take comfort in the knowledge that there are a great many options in today’s marketplace.



Ransomware: The Growing Threat

Published March 29, 2016 by

ransomwareBack in February, it was reported that Hollywood Presbyterian Hospital had become the latest high-profile victim of a cyber-attack.  Hackers had gained control of the hospital’s network and encrypted all patient records.... In truth, any company can be a victim of a ransomware attack.  All it takes, is a seemingly harmless or everyday email with an attachment.  So, what can corporations and institutions do to safeguard against these kinds of attacks?  Learn More.



Understanding the costs of downtime

Published March 15, 2016 by

What is downtime?

cost of downtime

Simply put, downtime is an interruption of your business. This interruption can be caused by a multitude of factors, both internal and external. How downtime affects your business is also influenced by the industry you are in, whether you are service-based, product-based, brick-and-mortar or online. Read more...



Data Backup Versus Server Recovery Solutions

Published March 01, 2016 by

Many business owners and “less technical” people in management think “data backups” are enough to protect their organization.  But when an outage occurs from equipment failure the recovery can be painful and take far longer than expected.  Read more.



Online Resources to Help Make Web Browsing Safer

Published February 08, 2016 by


The prevalence of online security threats to data or identity lurk in the back of many internet users’ minds. The suspect could be a link in an email from an unknown, or at least unfamiliar source. Or danger may come in the form of a “helpful” popup which carries an ominous message to proceed at your own risk. Fortunately, there are several online resources which can help make web browsing safer.  Read More.



I lost my smartphone, what can I do to protect myself against fraud?

Published February 01, 2016 by

lost smart phone need help

In today’s world, the use of smart devices is widespread across all economic levels of society.  So too, the theft of smartphones and other small portable devices is on the rise.  Whether we are talking, texting or using application data, the fact is that our smartphones and devices hold a lot of personal information.  So, what actions can a user take now to limit their liability and exposure to fraud or identity theft in the event their device is lost or stolen? Read More.



 Prev 1 2 3 4 5 Next    

Looking for older posts? View our Archives