DriveSavers Data Recovery Blog

Four Ways to Protect Yourself from a Data Breach

Thursday, November 20th, 2014

Data breaches have become an almost predictable problem with banks and major retailers. Now a couple of telephone companies have been fined $10 million for violating security laws designed to protect the confidentiality of customers proprietary information (PI). The customer names, Social Security numbers, birth dates, addresses, driver’s license numbers and other private information of […]

» Read More

Microscopic Particles Can Cause Huge Damage

Monday, November 10th, 2014

When a data recovery service provider is needed, be sure the facility has the proper industry certifications. Otherwise, the data you are missing may be at a much higher risk of being unrecoverable or even permanently destroyed. The Dangers of Microscopic Particles in Data Recovery As the platters in an HDD speed along at an […]

» Read More

SSD: What Happens When System Area Corruption Occurs

Tuesday, September 30th, 2014

Scenario: System Area Corruption There are different types of corruption that can occur in an SSD. In this article, the specific type we will be discussing is more commonly known as “system area corruption.” We’re all familiar with operating systems (OS) and file systems. What you may not be aware of is that the controller […]

» Read More

Medical Data: Tempting Target for Cyber Theft

Thursday, September 25th, 2014

Data breaches are a fact of life nowadays, so it’s not exactly surprising to learn of another hack in which more than 4.5 million medical patient records were recently stolen from Community Health, a Tennessee health care company. One of the largest hospital groups in the country, Community Health has more than 200 hospitals located […]

» Read More

Easy Does It With Apple iOS8 Upgrade

Wednesday, September 17th, 2014

The new iOS8 operating system for Apple’s lineup of portable computing devices is available for download on September 17. Before making the move, here’s what you should do to safely complete the upgrade process. First, if you haven’t already done so, make a backup copy of all data on every device that needs an upgrade. […]

» Read More

CD Rot: A Diskaster in the Making

Thursday, September 11th, 2014

CD rot sounds like yet another horrible disease du jour, but it’s not quite that. It’s what can happen over time to the recorded contents of compact disks and it’s not reversible. The Library of Congress, which maintains copies of important commercial recordings and printed materials, is struggling with the task of figuring how to […]

» Read More

SSD: What Happens When Files are Accidentally Deleted

Tuesday, September 02nd, 2014

Scenario: Data Deletion Data deletion occurs when a user deletes data and then empties the recycle/trash bin. TRIM Command In order to maintain optimal performance, all modern solid-state drives utilize the TRIM command. When enabled, this command executes automatically to delete and reset data that has been “Trashed” or “Recycled” and prepare for new data to […]

» Read More

Trends in Security of Data Recovery Operations

Sunday, August 31st, 2014

Using an Unscrupulous Data Recovery Vendor Can Result in Loss or Theft of Sensitive and Confidential Information (Novato, CA – January 10, 2012) – DriveSavers Data Recovery, the worldwide leader in data recovery services, announced today that the Ponemon Institute, a privacy and information management research firm, identifies in its second annual study, Trends in […]

» Read More


Wednesday, August 27th, 2014

Officially, it’s called the Health Insurance Portability and Accountability Act of 1996, but it’s usually shortened to just the letters HIPAA. The Security Rule specifies a series of administrative, physical and technical safeguards for covered entities and their business associates to use to assure the confidentiality, integrity and availability of electronic protected health information (EPHI). […]

» Read More

CryptoLocker Virus Thwarted

Tuesday, August 19th, 2014

If you have been hit by the CryptoLocker virus, now there’s hope you can retrieve your files. Researchers have turned the tables on suspected cyber criminals from Russia who used the CryptoLocker virus to extort millions from unwitting computer users all over the world. FireEye and Fox-IT, two technology firms, developed a recovery program to […]

» Read More