Blog Archives

Time To Control Unstructured Data – NTP Software File Reporter Briefing Note

IT professionals are tired of hearing that the growth of unstructured data is out of control. While attempting to curtail its growth is a noble cause, what IT really needs is the ability to control and manage it. Gaining control

Tagged with: , , , , , ,
Posted in Briefing Note

Can the Cloud Solve the Archive Problem?

The cloud seems like an ideal place to archive data. It provides a pay-as-you-grow model and enables the organization to begin to shrink the size of its on-premises storage footprint. The problem is, though, the three big providers (Amazon AWS,

Tagged with: , , , , , , , , , ,
Posted in Blog

Can Ransomware Infect Your Backups? – BackupAssist Briefing Note

It should come as no great surprise that ransomware is one of the scariest challenges for data protection people today. Black hats have figured out they can make more money faster by going after small and medium businesses than simply

Tagged with: , , , , , , , , ,
Posted in Briefing Note

How Are Backup Software Products Responding to Ransomware?

Backup software products are starting to adopt anti-ransomware features – and that’s a good thing. Ransomware has clearly expanded beyond consumers and is regularly attacking businesses and government entities. But not every backup company is convinced this is a problem

Tagged with: , , , , , , , , , , , , , , , , , ,
Posted in Blog

Why Windows File Server Archive ROIs are Broken

Windows file server archiving is the process of getting all the old data off of an organization’s Windows file servers and moving them to some less expensive form of storage. The concept has been around almost since there were Windows

Tagged with: , , , , , , , , ,
Posted in Blog

Ransomware Protection Requires Different Protocols

The core server component of most modern backup applications run on Windows. Unfortunately, Windows is also the primary target of ransomware attacks. While there are incidents of attacks on Linux or Macs, ransomware creators are going to go for the

Tagged with: , , , , , , , ,
Posted in Blog

Is your Windows Backup Server at Risk of Ransomware?

Your Windows-based backup server may be at risk to ransomware. That was the take away from a recent talk on ransomware at the VeeamOn conference in New Orleans. A ransomware attack could either begin at your Windows-based backup server or

Tagged with: , , , , , ,
Posted in Blog

Protecting From Ransomware without a Data Protection Overhaul

Ransomware is at the top of every IT professional’s project list, but the problem is most solutions to the problem require the replacement of the current data protection product. What if the current data protection solution is servicing the organization

Tagged with: , , , , , , , , ,
Posted in Briefing Note

How Do You Stop WannaCry?

Preventing the WannaCry attack is simple. Update Windows. Stopping the next ransomware attack may take more prevention steps. WannaCry leverages exploits that were made public when hackers revealed on April 14 a list of exploits that were allegedly developed by

Tagged with: , , , , ,
Posted in Blog