Blog

Backups and Zero Trust

Cybersecurity, data security, and hardening internal systems is a major concern for organizations and will increase in importance as time goes on. We’ve already covered some basic topics around data security – let’s continue to take a look at data backups and Zero Trust policies. Zero Trust, as a security model, is a framework based...
by Edit Balázsy Csóka

Cybersecurity’s biggest hurdle

Cybersecurity is a hot-button topic, and continues to pop up in mainstream industry news every time there is a large-scale failure. So why does it continue to see so little...
by Edit Balázsy Csóka

Software flaw opens vulnerability in NHS

A software flaw may have opened a new vulnerability in the NHS. The NHS is now reportedly “looking into” allegations that patient data was left vulnerable due to a...
by Matúš Koronthály

The future of cybersecurity

The industry has to look forward to the future of cybersecurity – including a new generation of specialists, and newly developed tools and procedures. This past Sunday, nearly...
by Matúš Koronthály

Preserving data from Microsoft 365

Microsoft 365 remains by far the most dominant system for enterprises and organizations worldwide. This has had, however, a corresponding effect on how much attention needs to be...
by Matúš Koronthály

AI and Cybersecurity – what to know

AI has been the hot topic for over a year now, with new developments almost monthly. AI and cybersecurity will naturally be two intertwined topics – let’s go over how the...
by Matúš Koronthály

Current trends in Cybersecurity

The new year has revealed interesting new trends in the cybersecurity and data handling space – some positive, some less so. Let’s take a quick look at some of the most...
by Matúš Koronthály

contentACCESS Backup for Microsoft 365 is here!

We at TECH-ARROW are proud to give you access to our newest product – contentACCESS Backup for Microsoft 365 is released now, along with contentACCESS 7.0! Why backup? As...
by Matúš Koronthály

TECH-ARROW partners with Wasabi

TECH-ARROW is proud to announce that we have formed a partnership with Wasabi Technologies, Inc. Who is Wasabi Technologies? Wasabi Technologies are a company dedicated to...
by Matúš Koronthály

Microsoft restricts OneDrive loophole

For the recent past, companies have been taking advantage of an unintended aspect of OneDrive’s policy to maintain user data from inactive accounts. Now, Microsoft is...
by Matúš Koronthály

Cyberattack on the Slovak Land Registry

Over the course of the last week, it has become apparent that the Slovak government is grappling with a major cyberattack on the Slovak Land Registry. The ransomware has...
by Matúš Koronthály

Forecasts for Data Archiving in 2025

As a new year starts, let’s kick it off by looking at some ongoing data trends and estimating what we can expect going forward: It’s instructive to begin with a look at...
by Matúš Koronthály

DELL EMC SourceOne end of life is here

As we wrote about well in advance, DELL EMC’s SourceOne was slated to reach End of Life starting at the end of this month. For current users, this means they are rapidly running...
by Matúš Koronthály

Police shuts down major cybercrime site

Last week, the German Central Office for Combating Cybercrime (ZIT) shut down Crimenetwork – the largest German-language cybercrime marketplace. Crimenetwork was the DACH...
by Matúš Koronthály

The Data Act comes closer

The EU’s Data Act, which entered into force early this year, comes closer to taking effect. The Data Act will start to apply in the EU in nine months, on the 12th of September...
by Matúš Koronthály

Cybersecurity incidents at the end of 2024

As we reach the end of 2024, the last quarter has seen the expected spike in cybersecurity incidents. With much of the world preoccupied with Black Friday deals and Christmas...
by Matúš Koronthály

Top 6 Reasons for Backups

Why is backing up your data so important, and what benefits do you get from it? Here are the top 6 reasons for keeping backups, and why this is key for any organization:...
by Matúš Koronthály

Data Storage and its costs

Data storage has been a hot topic for decades, despite the improvements to technology and changes to the market we have undergone. From improvements to hard drives and physical...
by Matúš Koronthály

Beyond Backups – Designing Disaster Recovery

We have discussed disaster recovery plans several times before. However, it’s important to look beyond backups and explore the other aspects of disaster recovery planning. This...
by Matúš Koronthály

Dangers of outdated backup systems

As organizations continue to grapple with securing their data and regulations insist on instituting baseline security measures, outdated backup systems continue to represent a...
by Matúš Koronthály