DriveSavers Data Recovery Blog

What Happens When System Area Corruption Occurs

Tuesday, September 30th, 2014

Scenario: System Area Corruption There are different types of corruption that can occur in an SSD. In this article, the specific type we will be discussing is more commonly known as “system area corruption.” We’re all familiar with operating systems (OS) and file systems. What you may not be aware of is that the controller […]

» Read More

Medical Data: Tempting Target for Cyber Theft

Thursday, September 25th, 2014

Data breaches are a fact of life nowadays, so it’s not exactly surprising to learn of another hack in which more than 4.5 million medical patient records were recently stolen from Community Health, a Tennessee health care company. One of the largest hospital groups in the country, Community Health has more than 200 hospitals located […]

» Read More

Easy Does It With Apple iOS8 Upgrade

Wednesday, September 17th, 2014

The new iOS8 operating system for Apple’s lineup of portable computing devices is available for download on September 17. Before making the move, here’s what you should do to safely complete the upgrade process. First, if you haven’t already done so, make a backup copy of all data on every device that needs an upgrade. […]

» Read More

CD Rot: A Diskaster in the Making

Thursday, September 11th, 2014

CD rot sounds like yet another horrible disease du jour, but it’s not quite that. It’s what can happen over time to the recorded contents of compact disks and it’s not reversible. The Library of Congress, which maintains copies of important commercial recordings and printed materials, is struggling with the task of figuring how to […]

» Read More

SSD: What Happens When Files are Accidentally Deleted

Tuesday, September 02nd, 2014

Scenario: Data Deletion Data deletion occurs when a user deletes data and then empties the recycle/trash bin. TRIM Command In order to maintain optimal performance, all modern solid-state drives utilize the TRIM command. When enabled, this command executes automatically to delete and reset data that has been “Trashed” or “Recycled” and prepare for new data to […]

» Read More

HIP, HIP, HIPAA

Wednesday, August 27th, 2014

Officially, it’s called the Health Insurance Portability and Accountability Act of 1996, but it’s usually shortened to just the letters HIPAA. The Security Rule specifies a series of administrative, physical and technical safeguards for covered entities and their business associates to use to assure the confidentiality, integrity and availability of electronic protected health information (EPHI). […]

» Read More

CryptoLocker Virus Thwarted

Tuesday, August 19th, 2014

If you have been hit by the CryptoLocker virus, now there’s hope you can retrieve your files. Researchers have turned the tables on suspected cyber criminals from Russia who used the CryptoLocker virus to extort millions from unwitting computer users all over the world. FireEye and Fox-IT, two technology firms, developed a recovery program to […]

» Read More

Is Your Data Safe at a Data Recovery Company?

Friday, August 01st, 2014

With any data recovery company, you should never assume anything, especially when it comes to security. DriveSavers guarantees the confidentiality and security of customer data. No exceptions. Every year the company undergoes a SOC 2 Type II audit that reviews the myriad of security and privacy protocols DriveSavers has in place to protect customer data. “The […]

» Read More

Legally Speaking of Cell Phones

Thursday, July 24th, 2014

The abundance of personal and private information contained in cell phones has compelled the U.S. Supreme Court to rule that police will need a search warrant to legally examine the contents of a cell phone, subsequent to an arrest (Riley v. California). “These cases require us to decide how the ‘search incident to arrest doctrine’ […]

» Read More

SanDisk & Fusion-io Target the SSD Data Center Storage Market

Friday, June 27th, 2014

When SanDisk bought Fusion-io for $1.1 billion earlier this month, it acquired more than a solid-state storage company. It gained access to Fusion-io’s big data center customers, like Apple and Facebook. The data center landscape is changing, with solid-state storage taking a leading role. The stakes are huge as providers of big storage use more […]

» Read More