How does granular recovery work and what do you need to know about it

In the modern office environment, every person working on projects generates huge amounts of data. Emails, datasheets, presentations, databases, documents, and many many more. Protecting this information is very important from the business standpoint, so usually, organizations tend to use backups as the mean of protecting their data. But backup is only one part of the equation. What would you do if somehow you lose that data? Well, you probably want to quickly and easily recover it. Then you should think about setting up a granular recovery (alt. granular restore) plan which is also the main topic of this article. 

Read more

Backup vs. data archive – what’s the difference?

Data backup and data archive are two terms that come with the topic of protection of business data. On the surface, it might seem that they are similar, but in fact, nothing could be further from the truth. They are used for very different purposes, and you must understand the differences between them. In this article, we will take a closer look at where the data archive shines, when is a time for backup, and what are the differences between them.

Read more

AES encryption 101 – why you should use encrypted backup

For many, encryption is a golden standard in data protection and the best way to ensure a high level of security in professional backup solutions. Could encryption be used as a mitigation mechanism against data breach events too? Yes. AES encryption is truly one of the most effective tools in the security professional’s arsenal. In this article, we will touch upon a variety of fundamental topics in data encryption. And if you prefer a more practical approach there is also an in-depth presentation of how Xopero ONE allows to encrypt [and protect] backed up data.

Read more

Data compression – why should you compress your backups?

With the growing number of data created by the Business every day (week or month) some easy ways to shrink the size of backups would help to improve data storage management. If only… But there is a quite smart solution for this problem. And in this article, we will talk about it. As you probably guessed our today’s topic is backup compression, and how it helps create a better backup strategy.

Read more

Grandfather-Father-Son backup – how does the GFS backup scheme work?

In the world of cybersecurity, we have a few problems that need to be solved. One of them is consistent data protection, where the backup has/plays a special role. There is this unattainable dream to keep all of your backup copies forever. Unfortunately for many organizations, such a task would be simply impossible to execute. Keeping backups requires storage space, which runs out quite quickly. 

Read more

Why backup Microsoft 365? How to convince a non-technician that your organization needs a backup solution

If you are wondering whether your Microsoft 365 data is protected by the provider – the answer is definitely yes, but maybe not to the extent you have in mind. In this article, I will present to you the problems that come with Office 365 and why you need to protect it with a dedicated Microsoft 365 backup. We will also discuss how to convince a non-technical to the necessity of such an investment.

Read more

Amazon’s Twitch data leak / Apache HTTP Server 0-day / VMware ESXi targeted in a new campaign

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

GriftHorse malware / New Windows domains backdoor / iPhone Apple Pay + Visa bug

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more

New malware – TinyTurla and Capoae / Fake certificate alert and dangerous TeamViewer

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more