Are You Taking Advantage of the Air Gap?

Posted by:

Knowing how to correctly store and protect your data is critical in any industry. With the constantly changing landscape of cybersecurity, you can never be too sure or too secure. We all know that where your files are stored, and who has access to them matters. However, what we often overlook is whether or not the storage location is connected to the internet. After all, if it’s online and vulnerable to hacking, how can it be secure? That’s why security ...

Continue Reading →
0

Vaulting: It’s Not Just for the Olympics

Posted by:

As technology advances, we have seen the emergence of cloud-based data storage. Although the idea of unlimited storage space may seem enticing, it comes at a price. In recent years, we have experienced a surge in data breaches and hacking attempts. According to the Identity Theft Resource Center, data breaches exceeded 1,300 in 2017, as compared to less than 200 in 2005. Security concerns like this have companies turning back to a data ...

Continue Reading →
0

The Prevention and Remediation of a Breach

Posted by:

breach readiness and protection

Breaches encompass a wide breadth of types and causes. While, it may be difficult to keep a dedicated team of expert hackers at bay, the truth is, many breaches are caused internally, through negligence or malice. Just as important, a breach doesn’t have to involve a computer at all. Paper-based personnel records are a treasure trove of personally identifiable information (PII) ...

Continue Reading →
0

Tape Vaulting: A Seasoned Veteran in an Online World

Posted by:

In recent years, new innTapes are scanned and tracked by COR365 employees at our Winston-Salem locationovations in storage technologies have brought forth an array of backup, recovery, and archiving options. In addition to tape vaulting, organizations can now choose from an array of options, such as flash storage, cloud, and hybrid cloud (among others). With the various options available, many ...

Continue Reading →
0