Skip to content

SSD: What Happens When System Area Corruption Occurs

Scenario: System Area Corruption There are different types of corruption that can occur in an SSD. In this article, the specific type we will be discussing is more commonly known as “system area corruption.” We’re all familiar with operating systems (OS) and file systems. What you may not be aware…

Medical Data: Tempting Target for Cyber Theft

Data breaches are a fact of life nowadays, so it’s not exactly surprising to learn of another hack in which more than 4.5 million medical patient records were recently stolen from Community Health, a Tennessee health care company. One of the largest hospital groups in the country, Community Health has…

Easy Does It With Apple iOS8 Upgrade

The new iOS8 operating system for Apple’s lineup of portable computing devices is available for download on September 17. Before making the move, here’s what you should do to safely complete the upgrade process. First, if you haven’t already done so, make a backup copy of all data on every…

CD Rot: A Diskaster in the Making

CD rot sounds like yet another horrible disease du jour, but it’s not quite that. It’s what can happen over time to the recorded contents of compact disks and it’s not reversible. The Library of Congress, which maintains copies of important commercial recordings and printed materials, is struggling with the…

SSD: What Happens When Files are Accidentally Deleted

Scenario: Data Deletion Data deletion occurs when a user deletes data and then empties the recycle/trash bin. TRIM Command In order to maintain optimal performance, all modern solid-state drives utilize the TRIM command. When enabled, this command executes automatically to delete and reset data that has been “Trashed” or “Recycled” and prepare…

Trends in Security of Data Recovery Operations

Using an Unscrupulous Data Recovery Vendor Can Result in Loss or Theft of Sensitive and Confidential Information (Novato, CA – January 10, 2012) – DriveSavers Data Recovery, the worldwide leader in data recovery services, announced today that the Ponemon Institute, a privacy and information management research firm, identifies in its second annual study, Trends in…

HIP, HIP, HIPAA

Officially, it’s called the Health Insurance Portability and Accountability Act of 1996, but it’s usually shortened to just the letters HIPAA. The Security Rule specifies a series of administrative, physical and technical safeguards for covered entities and their business associates to use to assure the confidentiality, integrity and availability of electronic…

CryptoLocker Virus Thwarted

If you have been hit by the CryptoLocker virus, now there’s hope you can retrieve your files. Researchers have turned the tables on suspected cyber criminals from Russia who used the CryptoLocker virus to extort millions from unwitting computer users all over the world. FireEye and Fox-IT, two technology firms,…

Is Your Data Safe at a Data Recovery Company?

With any data recovery company, you should never assume anything, especially when it comes to security. DriveSavers guarantees the confidentiality and security of customer data. No exceptions. Every year the company undergoes a SOC 2 Type II audit that reviews the myriad of security and privacy protocols DriveSavers has in place to…

Secure and Confidential . . . Protected

Secure and Confidential . . . Protected When you lose data and look for help in getting it back, security and confidentiality aren’t the first thoughts that come to mind, but they should be No. 2 and No. 3. At DriveSavers, we’ve been recovering data from a wide range of…

Back To Top
Search