Author Articles

Data recovery and the Internet of Things

In the desire to capture digital data about people and their

The good and the bad of encryption

The idea that criminals can hijack your computer content and use

Ransomware: the next computer threat

In the last couple of months discussion of the ransomware computer

Who’s responsible for what with BYOD?

It happens so fast – one moment of inattention on a

How the rise of Apple is changing data recovery

The rise of Apple devices in the consumer world is now

Six questions to ask before implementing BYOD

Employees often only see the ease and advantages of BYOD, but

Managing five risks of the BYOD trend

For many employees, the line between work and personal life has

How to protect your data in a foreign land

If you’re escaping the winter blues by heading overseas and plan

Damage control: What to do if your business data disappears

Any business that loses customer records, financial data or even a

Could your business’ data also be published on Wikileaks?

If you don't want to risk having your sensitive business data