Thank you for clicking that link!

“Thanks” is what cyber-criminals might say right after they get your ransom payment to unlock your systems and files from a ransomware attack. In this BlogBytes, we will look at the most common approach taken by cyber-attackers to infect systems.  We will also discuss how you can defend against this costly cyber-warfare by taking precautions…

March 4, 2019

What Does a Data Breach Mean to You?

Did you know that the cost of a data breach can be millions of dollars? According to a Ponemon Institute Cost of Data Breach Study as reported in a Security Intelligence article, “the average total cost of a breach ranges from $2.2 million for incidents with fewer than 10,000 compromised records to $6.9 million for…

February 13, 2019

Year in Review: Top 10 BlogBytes Of 2018

As expected, 2018 was the year of protecting data – and lots of it. Data stores grew rapidly and we saw an increase in cyber-criminal activities. In parallel the LTO Program’s BlogBytes saw increased readership across related topics including, how to protect against malware, ransomware and hackers. Read on to review the Top 10 BlogBytes…

February 5, 2019

Set Your 2019 New Year Resolutions

In January, everyone is evaluating their personal and business resolutions for the New Year. After reviewing several resolution lists, we’ve identified a few patterns. In this BlogBytes, we’ll review our top resolutions and how LTO Technology can help achieve them! Top Resolutions for 2019 According to The Balance SMB, the number one resolution for 2019…

January 23, 2019

Don’t Shed a Tier

Tiered storage is a methodology of taking categories of data and assigning them to a tier of storage based on the required time-to-access or access frequency. But an overriding goal of tiered storage is controlling costs.  In this BlogBytes, we will review tiered storage strategies and reveal a new definition for the final tier –the…

December 20, 2018

Make LTO-7 Tape Huge!

The amount of digital data generated worldwide is growing leaps and bounds. In a recent white paper, IDC estimates that the global datasphere will exceed 160 zettabytes (ZB) by 2025, with a 30% compound annual growth rate (CAGR). A portion of that datasphere will need to be stored long-term and companies are continually analyzing how…

December 5, 2018

Take a ‘Byte’ outta Crime

The largest security trade show in the North East of America, ISC East, was held in New York and welcomed over 7,000 security and public safety attendees, as well as over 250 industry leading security brands. The LTO Program was there highlighting how LTO-8 technology can be your data watchdog to help take a ‘byte’…

November 27, 2018

Healthcare Hacked!

Did you know that the healthcare industry is one of the most targeted sectors by cyber-attackers? As described by the Marsh & McLennan Companies in their report Holding Healthcare to Ransom it was noted, “more than one in four (27 percent) healthcare organizations report that they have been a victim of cyber-attack in the past…

November 13, 2018

Spice up the Ingredients!

IT pros, like you, attended SpiceWorld 2018 held in Austin, TX earlier this month. They discovered all sorts of spicy information to help manage technology, products, data and services. The main goal for attendees was to learn about the latest technology and determine which might be the best fit to benefit their organizations.  The LTO…

October 31, 2018

It’s National Archives Month!

October is National Archives Month and organizations around the world are focused on ways to preserve important content in the long-term and in the most economical manner. In this BlogBytes, we will discuss what an archive is and review the top 8 reasons why LTO technology is the secure archive strategy of choice including –…

October 16, 2018