Minimize the risk of ransomware
How to minimize the constant risk of ransomware and other cyber-attacks? Frequent data backups and testing of data recovery procedures are essential! Read more.
Documentation is Key to Compliance
Without documentation of your IT processes, you have no proof of their execution which means that they haven’t in fact been executed. This would be the strict conclusion of an IT audit. Read our article on IT audits.
Data Protection: What Works Today Could Be Non-Compliant Tomorrow
Just because your organization’s data protection practices are compliant with current corporate policies and industry requirements, doesn’t mean they will still be next month or a year from now.
Data Deduplication – Small Step big Difference
Why does data deduplication have such a big influence on backup performance and cost? Read more.
Get your IT Risk Priorities right for 2021
What kind of year will 2021 be from a risk management perspective? With the growing threat of cybercrime and the COVID-19 pandemic, it’s vital that you reevaluate your risk landscape to protect your business and IT plans.
New Standards for Information Security
Most companies strive to follow high IT security standards, but there is big difference to actually complying. A fact that now makes companies throughout industries demand a high level of documentation of information security and even an ISO 27001 certification.
Are you our new System Consultant?
Do you want to develop critical infrastructure solutions for the future, and have you recently finished your IT education? Read on here.
Don’t Let Data Migration be a Show Stopper
Backup on the fly, literally! Sometimes data migration just doesn’t execute fast enough. B4Restore’s mobile storage and backup capacity for temporary and urgent data migration needs helps speed up the customer migration process.
5 Questions a CFO Needs to Ask IT Security
IT security is business critical and should never be considered a mere expense: Done right, IT Security has the potential to accelerate a business, and it can be a disaster if the right security systems aren’t in place.
Guide to Data Classification
Can you put a price-tag on your data? A tier-based approach to storage and backup lets you optimize performance and cut-cost at the same time.
Keep Your Data Safe From Ransomware
Backup-as-a-Service is designed to keep your data safe from ransomware and other cyber-attacks. Read more
The Looming Threat of Cyber-crime: VERY HIGH
A new report from the Danish Centre for Cyber Security examines the new cybercrime ecosystem and categorizes the cyber-threat as “VERY HIGH”.
New Report on the Cyber Threat Against IT Service Providers
IT service providers are attractive targets for hackers, and a new report from the Danish Centre for Cyber Security mentions several examples of cyber attacks against IT service providers in Denmark and abroad.
What is Separation of Duties (SoD)?
As protection from cybercrime and ransomware attacks, safeguarding backup integrity is crucial for the ability to reestablish operations. However, a backup alone is not enough to ensure business continuity.