Blog

Microsoft restricts OneDrive loophole

For the recent past, companies have been taking advantage of an unintended aspect of OneDrive’s policy to maintain user data from inactive accounts. Now, Microsoft is restricting this OneDrive loophole, with the change taking effect a week from now. Until recently, if an employee left the company, a company could choose to cancel their OneDrive...
by Matúš Koronthály

Cyberattack on the Slovak Land Registry

Over the course of the last week, it has become apparent that the Slovak government is grappling with a major cyberattack on the Slovak Land Registry. The ransomware has...
by Matúš Koronthály

Forecasts for Data Archiving in 2025

As a new year starts, let’s kick it off by looking at some ongoing data trends and estimating what we can expect going forward: It’s instructive to begin with a look at...
by Matúš Koronthály

DELL EMC SourceOne end of life is here

As we wrote about well in advance, DELL EMC’s SourceOne was slated to reach End of Life starting at the end of this month. For current users, this means they are rapidly running...
by Matúš Koronthály

Police shuts down major cybercrime site

Last week, the German Central Office for Combating Cybercrime (ZIT) shut down Crimenetwork – the largest German-language cybercrime marketplace. Crimenetwork was the DACH...
by Matúš Koronthály

The Data Act comes closer

The EU’s Data Act, which entered into force early this year, comes closer to taking effect. The Data Act will start to apply in the EU in nine months, on the 12th of September...
by Matúš Koronthály

Cybersecurity incidents at the end of 2024

As we reach the end of 2024, the last quarter has seen the expected spike in cybersecurity incidents. With much of the world preoccupied with Black Friday deals and Christmas...
by Matúš Koronthály

Top 6 Reasons for Backups

Why is backing up your data so important, and what benefits do you get from it? Here are the top 6 reasons for keeping backups, and why this is key for any organization:...
by Matúš Koronthály

Data Storage and its costs

Data storage has been a hot topic for decades, despite the improvements to technology and changes to the market we have undergone. From improvements to hard drives and physical...
by Matúš Koronthály

Beyond Backups – Designing Disaster Recovery

We have discussed disaster recovery plans several times before. However, it’s important to look beyond backups and explore the other aspects of disaster recovery planning. This...
by Matúš Koronthály

Dangers of outdated backup systems

As organizations continue to grapple with securing their data and regulations insist on instituting baseline security measures, outdated backup systems continue to represent a...
by Matúš Koronthály

Continued Cyberattacks on Internet Archive

In a follow-up to the recent cyberattacks on Internet Archive, the organization has been attacked again during their recovery process – complicating an already difficult...
by Matúš Koronthály

What is the Cyber Resilience Act?

Halfway through Cybersecurity Month, it’s time to look at the latest EU-level regulation touching on cybersecurity – the Cyber Resilience Act, which is just now entering into...
by Matúš Koronthály

NIS2 Coming into Effect!

We are now only weeks from NIS2 coming into full effect on the 17th of October. This EU-mandated set of regulations is going to have far reaching consequences for organizations in...
by Matúš Koronthály

Storage Optimizer PRO is here

TECH-ARROW is proud to introduce the Storage Optimizer PRO update, with a host of new unique features to help you optimize your data storage and save on storage costs. Storage...
by Matúš Koronthály

Keeping archives up to date

Keeping archives and backups up to date is one of the keystones of a good data security backbone for any organization. This can include refreshing the software – but has to also...
by Matúš Koronthály

Data centers and continuity

Last week, we touched on the 3-2-1 Method and how it can benefit your data continuity in the face of possible hazards. With the floods ravaging Central Europe this week, it’s a...
by Matúš Koronthály

What does it mean to use the 3-2-1 method?

The 3-2-1 method is something that has been thrown around as a term in archiving and backup circles, usually in the same breath as “best practices” and with a strong...
by Matúš Koronthály

Zero-day attacks on Chrome

Microsoft warns that there is an ongoing zero-day attack on Chromium systems, including Chrome and Edge. Users are recommended to take extra care and update as soon as possible....
by Matúš Koronthály

Cybersecurity Update Q3 2024

Given major developments as we near the third quarter of 2024, it’s high time for a cybersecurity update. Among other news, National Public Data (NPD) announced that there...
by Matúš Koronthály