Cloud Backup
 

We`re just sending through your details

Please give us a few moments whilst we get your account ready.

OKAY

Reading College IT equipment stolen

Reading College IT equipment stolen

posted in Cyber-Security ● 24 Sep 2012

Thousands of pounds worth of ICT equipment was stolen from Reading College on the evening of September 12th just hours after it had been delivered.Items stolen included iMacs, MacBooks, laptops, computers and memory sticks. Thankfully, as the ICT equipment was new, it’s unlikely there was any private or confidential data on it when it was stolen.In the vast majority of cases, loss of information is far more costly than the loss of equipment itself. In addition to loss of business and reputation, organisations such as the Information Commissioners Office (ICO) have the power to impose hefty fines (up to the value of £500,000.00) in the event of data loss or theft where private individuals’ information is compromised. This includes, for example, the theft of backup tapes stored in a fire-safe onsite.Redstor’s online backup service ensures data is safely and automatically backed up offsite in an encrypted format. In so doing, it helps ensure organisations are protecting themselves against data loss. It also removes the reliance on tapes which helps reduce the risk of losing data whilst it’s being transported off-site unencrypted.

How third-party backup for OneNote and Class Notebooks avoids falling into non-compliance trap

If you use OneNote and Class Notebooks regularly, the prospect of waking up one day and finding that your notes have gone, is the stuff of nightmares.

Continue reading

5 ways to add real value to customers’ digital transformation initiatives by providing Kubernetes backup

Here we outline the five key elements CSPs and Azure consultancies need from a Kubernetes backup solution to add real value to customers’ digital transformation initiatives.

Continue reading

Microsoft 365 Security – An overview of best practices

The rise in home working, increase in laptops and wide-scale adoption of OneDrive, SharePoint , and OneNote has only served to intensify issues around data security and access.

Continue reading