Multifactor authorization can also be cracked

Multifactor authorization can also be cracked Recently in the news: the American Institute for Cybersecurity discovered that hackers got through multifactor authorization. You know the system when you log into your bank, for example: after logging in, you get another…

Be aware of vulnerabilities in your software

Be aware of vulnerabilities in your software Amnesia:33 is the name of Forescout’s research result, on vulnerabilities in widely used Open Source software. Seven products commonly used in network connectivity and communications between devices were examined; four software packages contained…

2021: stay vigilant for viruses!

2021: stay vigilant for viruses! The year 2020 will go down in the history books as “the year of the coronavirus,” and that is completely understandable and justified. Yet in our industry, we also noted the emergence of other viruses,…

Why you should or should not dedupe

Why you should or should not dedupe Deduplication is the technique of eliminating duplicate data in storage. Deduplication systems are widely used in backup storage; they readily calculate reachable rates as 20:1, which is partly true, but if you assume…

Limit the restoretime!

Limit the restoretime! It sounds logical and it is: the less data in the backup, the faster you can restore and thus the faster you are up and running again. Separation of active and archival data We talk about it…

Subscribe for tips and info

We regularly write blogs on current topics from the world of digital storage technology. Sign up here to be notified about new blogs.