Tuesday, September 30th, 2014
Scenario: System Area Corruption There are different types of corruption that can occur in an SSD. In this article, the specific type we will be discussing is more commonly known as “system area corruption.” We’re all familiar with operating systems (OS) and file systems. What you may not be aware of is that the controller […]
» Read More
Thursday, September 25th, 2014
Data breaches are a fact of life nowadays, so it’s not exactly surprising to learn of another hack in which more than 4.5 million medical patient records were recently stolen from Community Health, a Tennessee health care company. One of the largest hospital groups in the country, Community Health has more than 200 hospitals located […]
» Read More
Wednesday, September 17th, 2014
The new iOS8 operating system for Apple’s lineup of portable computing devices is available for download on September 17. Before making the move, here’s what you should do to safely complete the upgrade process. First, if you haven’t already done so, make a backup copy of all data on every device that needs an upgrade. […]
» Read More
Thursday, September 11th, 2014
CD rot sounds like yet another horrible disease du jour, but it’s not quite that. It’s what can happen over time to the recorded contents of compact disks and it’s not reversible. The Library of Congress, which maintains copies of important commercial recordings and printed materials, is struggling with the task of figuring how to […]
» Read More
Tuesday, September 02nd, 2014
Scenario: Data Deletion Data deletion occurs when a user deletes data and then empties the recycle/trash bin. TRIM Command In order to maintain optimal performance, all modern solid-state drives utilize the TRIM command. When enabled, this command executes automatically to delete and reset data that has been “Trashed” or “Recycled” and prepare for new data to […]
» Read More
Wednesday, August 27th, 2014
Officially, it’s called the Health Insurance Portability and Accountability Act of 1996, but it’s usually shortened to just the letters HIPAA. The Security Rule specifies a series of administrative, physical and technical safeguards for covered entities and their business associates to use to assure the confidentiality, integrity and availability of electronic protected health information (EPHI). […]
» Read More
Tuesday, August 19th, 2014
If you have been hit by the CryptoLocker virus, now there’s hope you can retrieve your files. Researchers have turned the tables on suspected cyber criminals from Russia who used the CryptoLocker virus to extort millions from unwitting computer users all over the world. FireEye and Fox-IT, two technology firms, developed a recovery program to […]
» Read More
Friday, August 01st, 2014
With any data recovery company, you should never assume anything, especially when it comes to security. DriveSavers guarantees the confidentiality and security of customer data. No exceptions. Every year the company undergoes a SOC 2 Type II audit that reviews the myriad of security and privacy protocols DriveSavers has in place to protect customer data. “The […]
» Read More
Thursday, July 24th, 2014
The abundance of personal and private information contained in cell phones has compelled the U.S. Supreme Court to rule that police will need a search warrant to legally examine the contents of a cell phone, subsequent to an arrest (Riley v. California). “These cases require us to decide how the ‘search incident to arrest doctrine’ […]
» Read More