We`re just sending through your details

Please give us a few moments whilst we get your account ready.

OKAY

Year of the data breach

Year of the data breach

posted in Cyber-Security ● 10 Dec 2014

2014 – The year of the data breach Data breaches dominated the news in early 2014, and unfortunately these showed little signs of lessening as we moved into the latter half of the year.

Trend Micro’s security roundup report showed the severity of data breaches actually intensified, in particular against financial and banking institutions. The statistics from data breaches reported to the ICO show that the industry sector which suffered the most data breaches was the Health sector and the top causes of data breaches were due to lost or stolen paperwork, sending confidential data via email, loss or theft of unencrypted devices and website hacking.

With 2014 being the year Microsoft stopped supporting Windows XP as well as the Heartbleed bug, many organisations suddenly became aware just how costly, disruptive and damaging a data breach could be, no matter how small. Sadly news of data breaches are commonplace and if you do not have the correct security procedures in place, it is not a question of if you will suffer a data breach but when.

With data breaches affecting businesses of all sizes, across all industries and all devices, it is time for 2015 to be the year of reckoning. Organisations must treat data security as an essential component of their business strategy, not just something to tick off a compliance sheet. Sony was aware of their security vulnerabilities for years prior to this latest breach, they just chose to take the risk. Something I am sure they regret now.

Redstor has a strong reputation for providing secure and encrypted cloud services, protecting the data of over 10000 organisations across the UK. Redstor cloud backup services store the encrypted data in the Redstor UK-only data centres. Our cloud sync and share service, Centrastor, enables organisations to store and share files and sensitive data securely from any device with an internet connection and our Centrastage service enables support providers to guarantee that devices they support are regularly audited, patched and safely up-to-date for effective endpoint management. To find out more about our services and how we can help you comply with data protection laws and prevent data leakage, please contact us either by giving us a ring on 01189 515 200 or emailing [email protected]

IDC Kubernetes infobrief

The rise of the digital economy, unexpected market events, and the growing need for business resilience has only served to accelerate the influence of the cloud on infrastructure.

Continue reading

10 things every IT service provider should know about providing Azure Kubernetes Services (AKS) backup

Kubernetes data protection represents a massive opportunity. Around 30% of global organizations are currently running containerised applications in production – by 2022, Gartner predicts that figure will be as high as 75%.

Continue reading

Rise in laptop sales leads to data protection worries

Reading, 6 April 2020 – An unwelcome repercussion of employees snapping up laptops for home working ahead of the coronavirus lockdown has been an even bigger spike in cyber-criminal activity.

Continue reading