Performing Network Backups? Use a Data Container!

August 25th, 2017


If you’re performing full image backups to NAS or RDX, you’ll want to seriously consider using a data container.

Normally, when you back up to an external device, Windows records your backup history on that device. Because of this, you can choose any day in the past you performed a backup, and then restore your data as it was on that particular day.

However, when you back up to a NAS or RDX drive, Windows can’t keep this backup history. You will only be able to restore your data from the last backup unless you create a data container.

Read more about the benefits of data containers and how to create one in this article.

Read the rest of this entry »

How Secure Are Your Passwords? Probably Not Very.

August 21st, 2017


Using numbers and symbols in your passwords to keep them secure? You’re doing it wrong.

Chances are, all you’re doing is making it harder for you to remember – and super easy for a computer to guess.

Here’s some password protection myths blown right open, and what you should actually do to make them secure.

Read the rest of this entry »

Bootable Backups: Making Disaster Recovery a Breeze

August 18th, 2017


Your hardware or OS fails, and your server won’t even start itself. Everyone’s complaining, and you’re under the pump. If only you could plug in an external drive, click your mouse a few times, and the whole thing was magically fixed.

Well, that’s exactly what our Bootable Backups let you do. So long as you make one ahead of time, even a major outage can be a breeze. Plus, being able to solve outages so easily will make you look seriously cool.

Read this article to learn more about Bootable Backups and how to make one.

Read the rest of this entry »

Virus Injected Into DNA and Used to Hack a Computer

August 16th, 2017


Researchers have successfully proven that viruses can be weaponized to infect computers and take them over. And if that’s not the premise of a dystopian sci-fi novel, I don’t know what is.

The University of Washington recently baked malware into a genetic molecule and then infected a system analyzing it. If it sounds like DNA data storage, you’re right; the premise is a natural expansion.

If you can put good code on DNA, then naturally you can put bad code on it – and any system that reads it is going to be at risk of infection. Which begs the question – since scientists have just learned to store data on atoms, will there one day be atomic-level malware?

Read the rest of this entry »

Backup Jobs in BackupAssist: Which One To Use?

August 14th, 2017


When you first open BackupAssist’s backup tab, you may be surprised by the number of different backup jobs you can perform. But which one do you choose?

This article answers that very question. In it, we go through what each backup job does, and when you should use it. It’s a great refresher for software newcomers and veterans alike.

Read the rest of this entry »

Is Tape Dead Or Not? IBM Record Break Raises Questions

August 9th, 2017


IPM have broken a world record in data storage; and they’ve done it on tape.

IBM fitted a whopping 330TB of uncompressed data on a palm-sized tape, smashing the record for magnetic tape storage density. It’s not quite DNA or Atomic storage, of course, but it’s pretty amazing given the storage media. That’s 201 gigabits per square inch!

The tape is a new Sony “spluttered magnetic tape” prototype. And this new technique is believed to be the key to “doubling the capacity (of tape) every two years, at least for the next 10 years”, according to IBM’s researchers.

So what does this mean for the future of tape backup media and your business?

Read the rest of this entry »

How To Successfully Maintain Your Server

August 7th, 2017


Even the best set-up server requires occasional maintenance. Here’s a ten point checklist on how to go about performing your own server upkeep and monitoring. Ticking these off can greatly minimize instances of server failure.

Read the rest of this entry »

Anti-Ransomware Tips: It May Not Be A Real Attack, So Check!

August 4th, 2017


Ransomware makers are cunning, exploitative, and deceptive. And that’s exactly why, if a ransomware message pops up on your screen, you should first take it with a grain of salt.

One of the latest trends in 2017 is not to even infect your system with ransomware. Instead, cybercriminals will just tell you they’ve compromised your system, and a place for you to deposit the ransom money.

And it’s worked. According to a recent Citrix Study which polled 500 U.K businesses, 200 of these reported being “bluffed” by a cybercriminal, with nearly two out of three forking over a payment.

The cost of each ransomware bluff was a whopping $16,000 at today’s exchange rate, with several victims playing double that amount—$32,000—to decrypt files that weren’t even encrypted in the first place!

The study also concluded a worrying trend – one that is profoundly altering the landscape of operating a business anywhere in the world.

Read the rest of this entry »

Found a Windows Bug? You Could Get a $15,000 Bounty

August 2nd, 2017


Found any kind of Windows flaw? Then you could be able to claim a big bounty from Microsoft, who announced all Windows flaws were now fair game.

While the company has been running bug bounty programs since 2013, it has expanded it year after year to include bugs in Hyper-V, Microsoft Edge, and exploit mitigation systems.

The company has released a list of payouts to bugs found, with some of the targeted schemes paying up to $250,000 for finding serious software weaknesses the developers overlooked.

So if you feel up to going ‘Full Fett’ on any part of Windows, you can turn that skill into some serious cash.

Read the rest of this entry »

What The Black Hats Predict For The World in 2018 / 2019

July 31st, 2017


The world’s foremost hackers have given their forecast for the future – and there’s a lot to keep us up at night.

Every year, the Black Hat conference – widely considered an early warning system of problems on the horizon- is held in Las Vegas. It is attended by experts in security and technology; from hackers to corporate and government security analysts.

Many things predicted at Black Hat come to pass. Examples include interference with the U.S. election, Internet-of-Things botnet attacks (which happened with Mirai, shutting down large parts of the internet), and the rise of data weaponization.

Read their four biggest predictions here. Or don’t, if you want what’s coming in the next two years to be a surprise!

Read the rest of this entry »