Published October 06, 2021
by Michele Vayle
An extensive article was published by Chuck Cook in 3PL Perspectives about “Protecting Your Data in a Changing Data Landscape" It details the fundamentals of data protection, recovery planning, and business continuity for 3PLs” Read more...
Published August 05, 2021
by Michele Vayle
Another article was published by Chuck Cook in 3PL Perspectives about “Disaster Recovery: Time Is of the Essence.” This article reviews the 10 key time-sensitive tasks for optimizing your disaster recovery plan. Read more...
Published May 14, 2021
by Michele Vayle
Multiple cloud solutions can serve you effectively, but only if you fully understand their functions and integrate them properly. You are responsible for the security of your data, so you should take great care in blending disparate components into a smoothly performing whole. Learn about leveraging multi-cloud tech...
Published May 06, 2021
by Michele Vayle
RenovoData recently published an article about Recovery Strategies vs. Recovery Solutions: Are Yours Aligned? in 3PL Perspectives, the third-party logistics magazine provided by the Transportation Intermediaries Association (TIA). Learn more...
Published December 08, 2020
by Michele Vayle
RenovoData appeared in the December 2020 edition of "The Dispatch" by McLeod Software. Read on...
Published November 14, 2020
by Michele Vayle
A recent article, “Navigating the New Normal: How Does it Look for Your Company?" was published in 3PL Perspectives. It discusses the importance of looking at what we have learned about conducting business during a pandemic. Read on...
Published August 03, 2020
by Michele Vayle
RenovoData was recently featured in an article about Online Security for a Remote Workforce in 3PL Perspectives, the third-party logistics magazine provided by the Transportation Intermediaries Association (TIA). Read the article...
Published July 06, 2020
by Michele Vayle
The new normal...how does it look for your company? Despite the downsides of the Covid-19 pandemic, companies a rare opportunity for innovation, growth, and improvement. Learn more...
Published June 28, 2020
by Michele Vayle
Online security for a remote landscape. The growth of remote workforces has weakened many organizations’ normal protections, resulting in a new generation of malware. New varieties of fraudulent clickbait appear in the form of fictitious cures and bogus pandemic services, along with the usual scams. Learn more about some steps you can take while your employees work remotely.
Published May 04, 2020
by Michele Vayle
RenovoData was featured in the 3PL Perspectives publication (May 2020 Edition) with this article: Know Your Security Vulnerabilities: The Danger is in the Details". The Logistics Journal is a third-party logistics magazine provided by the Transportation Intermediaries Association. Read on...
Published April 24, 2020
by Chuck Cook
The COVID-19 outbreak may have caught the world off guard and will end and one day. The actions your company takes now will affect its future. For Guidance in planning your company's powerful response to the pandemic, please click on the link.
Published February 12, 2020
by Chuck Cook
When emergencies arise, people are thrust into fight-or-flight mode. At these times the speed, accuracy, and thoroughness of the team’s responses can mean the difference between a company’s survival and its destruction. Learn what to do when hacker assaults, weather events, or other catastrophes threaten your data and systems.
Published January 30, 2020
by Michele Vayle
Every organization with an online presence is at risk of a cyberattack and effective protection against it must be well-planned out. You don’t have to reinvent the security wheel. Establish standards that will guide you.To learn more about how to protect your company click on the link.
Published January 06, 2020
by Michele Vayle
RenovoData was featured in the 3PL Perspectives publication (December 2019 Edition) with this article: Cloud Solutions Are Not Created Equal. Differences Include Security, Privacy, Data Mining, and More...". 3PL Perspectives is a third-party logistics magazine provided by the Transportation Intermediaries Association. Read on...
Published October 15, 2019
by Tech Team
Effective data backup and disaster recovery are imperative in our current technological environment. When disasters strike, whether through malicious cyber-attacks, natural events, or unforeseen accidents, systems and backed-up data need to be recovered quickly if the company is to avoid losses of productivity, performance, and reputation. Read more on the ideal use case for cloud...
Published September 13, 2019
by Renovo Editor
RenovoData was featured in the 3PL Perspectives publication (September 2019 Edition) with this article: The Cloud Can’t Eliminate Your Responsibility for Data Protection. 3PL Perspectives is a third-party logistics magazine provided by the Transportation Intermediaries Association. Read on...
Published January 17, 2019
by
Single sign-on (SSO) is an important element in the complex structure of an effective security program. It is a service that gives a user access to multiple network destinations by entering only one login, one username, and one password. Simplifying the login process streamlines workflow and adds a layer of safety by reducing .... [Read More].
Published October 23, 2018
by
The term digital transformation represents today’s continuous proliferation of digital technologies, and it also points to the speed with which they are being integrated into every area of activity. On a global scale, this steady acceleration is remaking human society, strongly affecting the ways we do business. Read More.
Published June 14, 2018
by Chuck Cook
In recent years, the cloud has become a major part of the IT landscape, bringing many benefits and a wide variety of options. In addition to virtually unlimited data storage, the cloud imparts improvements in speed, availability and user mobility. It carries significant financial savings as well, including cost cuts, on-demand capacity, and reduction of resources previously allocated to infrastructure and operations. Read the full Story.
Published January 23, 2018
by
Are you aware of the challenges of Blockchain technology, in addition to how it affects your data and business continuity?. Learn More...
Published November 07, 2017
by
You can protect your Data with these three steps.
Cyber Security Threats are nothing new, but the recent explosive growth has become a global concern. News reports of such attacks have become commonplace. The September 20, 2017 issue of PC Magazine states that In the first half of 2017, there were 1.9 billion data items compromised worldwide, compared to 1.38 billion for the entire year of 2016.
While cyber-attacks against major corporations and governments make headlines, upwards of 70% of these breaches target small businesses, so every organization with an online presence is vulnerable. Learn (a lot) more...
Published September 12, 2017
by
The Internet of Things has been with us for a while, starting with Internet applications for phones, cars and personal devices. As IoT applications multiply, they are revolutionizing the IT landscape.
Founded on widespread wireless availability, IoT applications consist of several components ... Read More and get our recommendations on staying ahead of the expanding opportunities hackers are finding.
Published July 05, 2017
by Renovo Editor
Last month (June 2017), RenovoData were once again featured in The Logistics Journal. The article provides expert-level detail on helping 3PL and Trucking Companies to get a grasp on the realities of data backup and to avoid the traps of common misconceptions that often circulate. Learn more.
Published June 15, 2017
by Bob Kelleher
New do-it-yourself cyber-extortion kits make it easy.
Since its invention in the mid-2000s, ransomware has become the world’s premier cyber-security threat. Typically gaining entry to a system via bogus emails or notifications, this malware enables criminals to capture a system’s data and demand payment for its release. Read More...
Published February 14, 2017
by Renovo Editor
In December 2016, RenovoData were featured in the leading publication from the Transport Intermediaries Association, The Logistics Journal. The article provides expert-level detail on helping 3PL and Trucking Companies to choose the right disaster recovery solution. Learn more and read the full article.
Published January 10, 2017
by Renovo Editor
In November 2016, RenovoData were once again featured in the leading publication from the Transport Intermediaries Association, The Logistics Journal. The article, authored by our own Data Protection Expert, Chuck Cook, provides expert-level detail on Network Security (Simple Concept, Complex Reality) including security-risk lingo (vulnerabilities, threats, breaches, etc), planning a security program, reduction of human error, what to protect, knowing your enemies, and their weapons! And, of course the importance and value of testing. Learn more and read the full article.
Published October 27, 2016
by Chuck Cook
Effective security demands the strongest possible protective measures, encompassing every aspect of the network. Although technical components are separate items and the organization itself comprises various aspects of the security process, all are bound together to form a whole, like the layers of an onion. Both technical and human components can be at risk. Only by implementing universal security policies and procedures can the entire system be safeguarded. Learn More.
Published October 05, 2016
by Chuck Cook
Data protection is nothing less than business protection, and to be effective it must be as nearly invincible as possible. Yet even the most technically sophisticated organizations, those familiar with the fine points of data backup, can make a particularly dangerous mistake: not noticing a single point of failure. This means any significant part of a system that is without redundancy. If one major component ceases to function, it can set off a cascade of collapse and the system can stop cold.
Published July 19, 2016
by Bob Kelleher
Data backup is a vital component of a solid disaster recovery plan, but is only one part. Backup software is intended to ensure against data loss, but may not always perform flawlessly and does nothing to protect the operating system environment. Even with the best backup software and the most reliable offsite facility, the overall environment is vulnerable to severe damage unless a thorough disaster recovery plan is in place. Read more about the vital differences between data backup and recovery.
Published July 05, 2016
by Chuck Cook
As ubiquitous as sophisticated data backup has become, misconceptions about it are everywhere. These include widespread and mistaken beliefs about how backup works, what solutions are available, differences between vendors, and the risks companies run when choosing, installing and working with backup solutions. Two main reasons are the fact that backup technology never stops evolving, and the ballooning threat of hacker sabotage. Read More...
Published May 19, 2016
by Chuck Cook
The objective of ransomware is simple: using invasive encryption to extort money by holding an organization’s network and data hostage. But ransomware technology is far from simple, and it can inflict severe damage on businesses and institutions of any size.
Read "Guarding Against Ransomware: Some Essentials" now.
Published May 12, 2016
by Chuck Cook
Over the last decade, cloud backup and recovery options have emerged as a secure, cost-effective and reliable method of protecting increasing amounts of data a company generates daily. However, some companies may have lulled themselves into a false sense of security as the measures they have put in place, while a step in the right direction, cannot fully protect all business functions in the event of a disaster or data loss event. Read More.
Published April 12, 2016
by Chuck Cook
Over time, you may find that your current cloud-storage system is no longer meeting your needs as well as it had in the past. Perhaps you want better pricing or more features or a higher level of service. Whatever it is that is motivating you to shop around, you can take comfort in the knowledge that there are a great many options in today’s marketplace.
Published March 29, 2016
by Chuck Cook
Back in February, it was reported that Hollywood Presbyterian Hospital had become the latest high-profile victim of a cyber-attack. Hackers had gained control of the hospital’s network and encrypted all patient records.... In truth, any company can be a victim of a ransomware attack. All it takes, is a seemingly harmless or everyday email with an attachment. So, what can corporations and institutions do to safeguard against these kinds of attacks? Learn More.
Published March 01, 2016
by Chuck Cook
Many business owners and “less technical” people in management think “data backups” are enough to protect their organization. But when an outage occurs from equipment failure the recovery can be painful and take far longer than expected. Read more.
Published February 08, 2016
by Chuck Cook
The prevalence of online security threats to data or identity lurk in the back of many internet users’ minds. The suspect could be a link in an email from an unknown, or at least unfamiliar source. Or danger may come in the form of a “helpful” popup which carries an ominous message to proceed at your own risk. Fortunately, there are several online resources which can help make web browsing safer. Read More.
Published February 01, 2016
by Chuck Cook
In today’s world, the use of smart devices is widespread across all economic levels of society. So too, the theft of smartphones and other small portable devices is on the rise. Whether we are talking, texting or using application data, the fact is that our smartphones and devices hold a lot of personal information. So, what actions can a user take now to limit their liability and exposure to fraud or identity theft in the event their device is lost or stolen? Read More.
Published January 13, 2016
by Chuck Cook
The first thing to know about fake antivirus is that its primary purpose is to separate you from your money. For the most part, cybercriminals distribute fake antivirus programs via Internet ads and popups and sometimes through poisoned search results. It is often referred to as “scareware” and with good reason! However, through awareness and vigilance, you can greatly reduce the risk that antivirus scams could invade your company’s network. Read More.
Published December 21, 2015
by Chuck Cook
Malware, in various forms, has been around a long, long time. Once one variant is defeated another one is created. Criminal elements use malware to steal information, ransom money from victims and generally create chaos. Dealing with malware requires awareness, vigilance and proper protection. Read More.
Published December 08, 2015
by Chuck Cook
What is patching? Patching is another term for software updates. According to Wikipedia, a patch is “a piece of software designed to update a computer program or its supporting data, to fix or improve it.” From time to time, you may see an icon pop up prompting you to update Java or Adobe, etc. Or you’ll go to shut down your computer but your operating system may have other ideas... Read More.
Published November 24, 2015
by Chuck Cook
This post is part of a series of articles about how small business owners can prevent scams and fraud in the workplace. Today, we look at online fraud, specifically, ‘Phishing’. Phishing can be defined as “the activity of defrauding an online account holder of financial information by posing as a legitimate company.” Read More.
Published November 17, 2015
by Chuck Cook
Over the course of the year, we are all busy working on our tasks, projects and initiatives. As the Holiday Season approaches, we cannot help but to take a moment to be thankful for the opportunity to be your data protection partner... Read More.
Published September 09, 2015
by Chuck Cook
How to create a secure password for business can be a little tricky these days. With Fortune 500 companies like Sony and or health care giants like Anthem Blue Cross being hacked on a regular basis, how can you ensure that your information is locked down tight? Read More...
Published August 24, 2015
by Chuck Cook
Security is not just for banks and big businesses. It’s for all organizations, big or small. Over the years, we’ve found a large number of organizations that could have prevented a data loss or data breach event from occurring by taking a few precautions. Read More.
Published August 20, 2015
by Chuck Cook
Over the last decade, cloud backup, recovery, and restoration options have emerged as a secure, cost effective, and reliable method of protecting the ever increasing amounts of data a company generates daily. However, switching to a cloud-based backup system is a serious proposition that requires a clear understanding of how such a solution will integrate into the company's existing infrastructure.
Published August 17, 2015
by Chuck Cook
What would happen to your business if a disaster rendered your office building unusable? What about a data loss event that caused your company’s data to be lost or unavailable? Do you have a contingency plan to make sure your business is protected? These plans can be as complex or simple as you need them to be... Read More.
Published July 22, 2015
by Chuck Cook
If you’re running a business, losing your emails, conversations with clients, and the ability to interact with the world outside of your company can bring your business to a screeching halt. Now if your email goes down and you lose your emails, it can feel like you’re aboard the Titanic and it’s going down- fast. So how do you prevent a massive loss? And how do you make sure that when you backup your data you’re also backing up your email? Read More.
Published July 01, 2015
by Chuck Cook
The widespread and ubiquitous integration of smartphones and tablets into our daily lives has created an environment where hackers are taking every opportunity to gain access and steal user data. The common perception is that these smartphones and other mobile devices are secure by default – this is a potentially dangerous and costly misconception. Read More.
Published June 17, 2015
by Chuck Cook
In today’s business environment, everyone knows to watch out for hackers. However, data leakage and loss from negligent file sharing is becoming just as significant a risk as data theft. Popular applications like Dropbox and Box do increase productivity and make collaboration easier. Read More.
Published June 10, 2015
by Chuck Cook
What is a single point of failure? If you are running your company’s website from a single server and that server goes down, you are looking at a single point of failure. If such a risk exists for your company, you will want to take steps immediately to reduce that risk. Read More.
Published June 03, 2015
by Chuck Cook
Are you still using Windows Server 2003? Now is the time to upgrade. Mainstream support ended on July 13, 2010 and extended support will end soon - on July 14, 2015. Old, unsupported operating systems do pose an increased risk for data breach. Read More.
Published May 27, 2015
by Chuck Cook
Did you know? 71% of security breaches target small businesses. In light of this, for this blog post we will focus on the following aspects of data protection for small businesses... Read More.
Published May 20, 2015
by Chuck Cook
Imagine that you are in your car and driving to work. Suddenly, there is an urgent call from your assistant telling you that your company’s website has been attacked by hackers. Visitors to your corporate site are not only seeing the messages and images posted by hackers, but screenshots of private emails sent to your company posted to Twitter for all the world to see. This is a situation that Lenovo sadly faced back in February of this year. Read More.
Published May 13, 2015
by Chuck Cook
Having a solid backup and recovery strategy is vital for today’s business environment. Traditionally, focus has been placed on external threats and natural disasters. However, recent data breaches have shown us the wisdom of recognizing potential weaknesses and threats from the inside. Read More.
Published May 06, 2015
by Chuck Cook
Advances in technology, most notably cloud-based services, are changing how companies do business. The legal industry, though not early adopters of cloud-based data backup and recovery applications, are now rapidly “coming up to speed”. Included below are several questions to consider for moving the legal industry to the cloud... Read More.
Published April 15, 2015
by Chuck Cook
Taking a look at the recent cyber-attack on health insurance giant Anthem, there seems to be a consensus that the institution was particularly vulnerable due to a lack of internal encryption. Another point to consider is that this industry is slower to adopt measures like... Read More.
Published April 08, 2015
by Chuck Cook
File sharing is widespread and rapidly becoming “business as usual” for many companies and corporations. The ability to share files with co-workers increases productivity and ultimately reduces costs. Read More.
Published March 11, 2015
by Chuck Cook
Last year, the FBI in the United States, and other authorities world-wide, took down the infrastructure used to distribute CryptoLocker—thereby disrupting the effectiveness of the malware. Soon after, new breeds of ransomware were born. Read More.
Published March 04, 2015
by Chuck Cook
At RenovoData, we care about our customers, especially keeping their data safe and protected. We work tirelessly to ensure that crucial business data is backed up and recoverable in the event of a disaster or data loss event. Read More.
Published February 25, 2015
by Chuck Cook
At RenovoData, we believe that treating VM data protection separately from your overall data protection plan is not only a replication of effort but an inefficient use of resources. The backup, recovery and protection of data on virtual machines should be integrated into an enterprise-wide data backup strategy and practice. Read More.
Published February 18, 2015
by Chuck Cook
Every company should have an electronic data retention policy which is documented. Also, it is important to consider the long-term consequences of implementing a data retention policy. Read More.
Published February 11, 2015
by Chuck Cook
Think of your Business Continuity/Disaster Recovery Plan like an insurance policy. Here is our list of 10 must-haves for your BC/DR plan… Read More.
Published February 04, 2015
by Chuck Cook
While most companies today backup at least some of their data, many of these organizations do not have a solid disaster recovery plan. Why is that? Some believe… Read More.
Published January 28, 2015
by Chuck Cook
Organizations are backing up loads of data. With emerging trends such as big data and ongoing regulatory compliance pressure, data volumes have skyrocketed. This trend is projected to… Read More.
Published January 14, 2015
by Chuck Cook
If your company has employees that use a laptop, smartphone or tablet, then you’ve got endpoint data. Traditionally, the responsibility of backing up… Read More
Published January 07, 2015
by Chuck Cook
I’m here to tell you that the financial advantages of RenovoData’s cloud backup service go beyond lower total cost of ownership. First, let’s recap some of the basics… Read More
Published December 31, 2014
by Chuck Cook
What is CryptoLocker? If you are asking that question, then you may be lucky enough not to have been affected by this insidious bit of code. Read More...
Published December 03, 2014
by Chuck Cook
In general, cloud storage systems rely on hundreds of data servers. Occasionally, computers experience downtime due to repairs or maintenance… Read More...
Published November 12, 2014
by Chuck Cook
The first concept to understand with regards to secure data transfer is that of encryption. Encryption, is the process of changing information in such a way as to make it unreadable by anyone except those possessing the key. Read More...
Published October 29, 2014
by Chuck Cook
In the past, data recovery has relied on tapes to backup and protect a company’s vital data. Let’s recap some of the major problems with the tape backup: Read More...