We use cookies on our website. By continuing to use this site, you agree to our cookie policy - Okay, Got it.

RenovoData - The Data Protection Blog

about renovodata

The “Cheap Tool” or the “Best Tool” for the Job? Your Choice.

Published November 16, 2016 by

server protectionThe cost of server downtime can be overwhelming. To estimate just how expensive it could be for your business, take a moment to calculate your potential losses. You’ve probably taken steps to guard against major hardware failure, but if you’re relying solely on a data backup solution to recover your server, you might be setting yourself up for future problems.  Read more about protecting your server and using the correct tools.


 


 

The security onion - A single entity with many layers.

Published October 27, 2016 by

security onionEffective security demands the strongest possible protective measures, encompassing every aspect of the network. Although technical components are separate items and the organization itself comprises various aspects of the security process, all are bound together to form a whole, like the layers of an onion. Both technical and human components can be at risk. Only by implementing universal security policies and procedures can the entire system be safeguarded.  Learn More.


 


 

Eliminate Single Points of Failure: And Don’t Overlook the Cloud

Published October 05, 2016 by

single point of failureData protection is nothing less than business protection, and to be effective it must be as nearly invincible as possible. Yet even the most technically sophisticated organizations, those familiar with the fine points of data backup, can make a particularly dangerous mistake: not noticing a single point of failure. This means any significant part of a system that is without redundancy. If one major component ceases to function, it can set off a cascade of collapse and the system can stop cold.


 


 

Predicting the Costs of Downtime - as Featured in the Logistics Journal, August 2016

Published September 22, 2016 by

RenovoData Ransomware articleIn August, RenovoData again were once again featured in the leading publication from the Transport Intermediaries Association, The Logistics Journal.  The article, written by our own Chuck Cook, provides expert-level detail on recent downtime scenarios that have made the news as well as looking at the possible assessments a company can take to gauge their potential downtime.  Learn more and read the full article


 


 

Planning for Disaster Recovery: What Could Possibly Go Wrong?

Published September 08, 2016 by

DR planningWhere disaster recovery is concerned, having the right tools and procedures in place is paramount, of course. Our Data Protection Services are your powerful defenses to recover from data corruption, our Server Recovery Solutions enable you to recover systems quickly, and our Consulting & Strategy capabilities provide expert guidance along the way, but first you need a comprehensive business disaster recovery plan. Before finalizing your plan, you need to ask yourself some questions. What should be the basics of your plan? What steps should the plan include? Ask yourself what problems would test the strength and thoroughness of your plan? Read More.


 


 

Protecting 3PL and Trucking Companies: Ransomware - as Featured in the Logistics Journal, July 2016

Published August 15, 2016 by

RenovoData Ransomware articleIn July, RenovoData again were featured in the leading publication from the Transport Intermediaries Association, The Logistics Journal.  

The article, written by our own Chuck Cook, provides critical and detailed information on the immense risk that all 3PL and trucking companies face: Ransomware.  Learn more and read the full article. 


 


 

Sometimes one size fits all. And sometimes it doesn’t. With disaster recovery, it never does.

Published August 04, 2016 by

One size does not fit all - especially with disaster recoveryOne key to business success is the ability to manage and exploit masses of data. That’s a given. For companies of any size, this calls for sophisticated IT systems with components that precisely match the organization’s functional requirements in virtually every area. Many of those components must be capable of interacting with each other, seamlessly and reliably. Each element of a well-designed IT system is carefully selected, installed with appropriate customization, and continually monitored in production... From these simplistic perspectives, companies are apt to think of disaster recovery systems as necessary but essentially simple and similar, like basic office supplies. Read More.


 


 

Who needs disaster recovery if you’ve got data backup? They’re the same thing, right? No, they're not.

Published July 19, 2016 by

data back up vs data recoveryData backup is a vital component of a solid disaster recovery plan, but is only one part. Backup software is intended to ensure against data loss, but may not always perform flawlessly and does nothing to protect the operating system environment. Even with the best backup software and the most reliable offsite facility, the overall environment is vulnerable to severe damage unless a thorough disaster recovery plan is in place. Read more about the vital differences between data backup and recovery.


 


 

The Mythology of Data Backup

Published July 05, 2016 by

mythology of data protectionAs ubiquitous as sophisticated data backup has become, misconceptions about it are everywhere. These include widespread and mistaken beliefs about how backup works, what solutions are available, differences between vendors, and the risks companies run when choosing, installing and working with backup solutions. Two main reasons are the fact that backup technology never stops evolving, and the ballooning threat of hacker sabotage.  Read More...


 


 

Pay up or we'll kill your data

Published June 02, 2016 by

Ransomware pay up or we kill your dataA sophisticated new generation of ransomware is rolling across North America.  It doesn’t just steal your information and wreak havoc with your IT systems.  It steals your money.

Several versions of ransomware are at large. They go by different names, such as Crypto locker, Crypto wall and others. They usually propagate as Trojans, entering networks via innocent-looking links in emails or innocuous messages from unknown websites.

Without up-to-date anti-virus and malware protection installed on every PC and laptop connected to your network, you are vulnerable to attack.  Read More.


 


 

  Prev 3 4 5 6 7 Next    

Looking for older posts? View our Archives