New Standards for Information Security
Most companies strive to follow high IT security standards, but there is big difference to actually complying. A fact that now makes companies throughout industries demand a high level of documentation of information security and even an ISO 27001 certification.
Are you our new System Consultant?
Do you want to develop critical infrastructure solutions for the future, and have you recently finished your IT education? Read on here.
Don’t Let Data Migration be a Show Stopper
Backup on the fly, literally! Sometimes data migration just doesn’t execute fast enough. B4Restore’s mobile storage and backup capacity for temporary and urgent data migration needs helps speed up the customer migration process.
5 Questions a CFO Needs to Ask IT Security
IT security is business critical and should never be considered a mere expense: Done right, IT Security has the potential to accelerate a business, and it can be a disaster if the right security systems aren’t in place.
Documentation is Key to Compliance
Without documentation of your IT processes, you have no proof of their execution which means that they haven’t in fact been executed. This would be the strict conclusion of an IT audit. Read our article on IT audits.
Guide to Data Classification
Can you put a price-tag on your data? A tier-based approach to storage and backup lets you optimize performance and cut-cost at the same time.
Keep Your Data Safe From Ransomware
Backup-as-a-Service is designed to keep your data safe from ransomware and other cyber-attacks. Read more
The Looming Threat of Cyber-crime: VERY HIGH
A new report from the Danish Centre for Cyber Security examines the new cybercrime ecosystem and categorizes the cyber-threat as “VERY HIGH”.
Data Protection: What Works Today Could Be Non-Compliant Tomorrow
Just because your organization’s data protection practices are compliant with current corporate policies and industry requirements, doesn’t mean they will still be next month or a year from now.
New Report on the Cyber Threat Against IT Service Providers
IT service providers are attractive targets for hackers, and a new report from the Danish Centre for Cyber Security mentions several examples of cyber attacks against IT service providers in Denmark and abroad.
What is Separation of Duties (SoD)?
As protection from cybercrime and ransomware attacks, safeguarding backup integrity is crucial for the ability to reestablish operations. However, a backup alone is not enough to ensure business continuity.
What you Need to Know About Ransomware
Ransomware is currently the most widespread cybercrime business model. How does it work? Read more.
How to Unite Multi-Cloud with Data Protection
Storing data in multi-cloud environments presents a range of challenges, not least when it comes to backing up your data. Read about the most common challenges...
New IT Operations Specialist in Aarhus
Busy times at B4Restore has called for strong backup in terms of Thomas Bundgaard, who will be joining the storage and backup team in Aarhus.