Subscribe: Platter Chatter - data-recovery
http://feeds.feedburner.com/PlatterChatter-Data-recovery
Preview: Platter Chatter - data-recovery

Platter Chatter - Data Recovery



Your Trusted Name In Hard Drive Recovery Since 1993. We Recover Your Data, Or You Don't Pay.



Published: Mon, 23 Apr 2018 13:54:06 GMT

 



Data Recovery D-I-WHY

Fri, 13 Apr 2018 17:31:18 GMT

Submitted for your approval, one enthusiastic amateur. Put on earth with a screwdriver, a broken drive, and wholly too much time on his hands. In a moment, we will be shown a miracle brought by magical DVD lasers. Although it’s a fact that he should have trusted the professionals, he will tempt fate by converting a 500Gb hard drive to a 1Gb Linux boot CD, in… The Recovery Zone.

src='https://gfycat.com/ifr/BraveRepentantHorseshoecrab' frameborder='0' scrolling='no' width='100%' height='100%' style='position:absolute;top:0;left:0;' allowfullscreen>
(image)



Chomping at the Bit[coin] to Acquire Cryptocurrency?

Fri, 02 Mar 2018 18:58:04 GMT

The Truth Behind the Currency of the Internet

Before deciding to hop on the Bitcoin bandwagon, it’s important to fully understand the risks and implications of the unknown world of encryption keys, digital tax evasions, and Blockchain technology.

(image)



Protect those Olympic Moments at Pyeongchang Winter Games

Tue, 20 Feb 2018 20:35:43 GMT

Whether you’re an athlete, tourist or journalist – you don’t want to be unable to access those golden moments from the Olympic Games in Pyeongchang.

(image)



International Data Privacy Day: Strong, Sensitive, Secure

Thu, 25 Jan 2018 18:03:11 GMT

While the majority of Americans were asking Santa for new tech, we were busy building a contingency plan to protect our existing devices. In December, we were all wishing for things. In January, it’s time to take action to protect our technology and sensitive data from prying eyes, ears, and keyboards.

(image)



The 12 Days of Data Recovery, expanded edition

Thu, 21 Dec 2017 19:26:07 GMT

“In the 12 Days of Christmas, Customers sent to us…” Now with interactive expanded explanations!

(image)



6 Practical and Essential Data Safety Items to Put on Your Wishlist (And Check Twice)

Wed, 20 Dec 2017 16:03:09 GMT

Our tech support and data recovery specialists have assembled a practical wish list for your cyber safety, so you can have the most wonderful time all year, every year (approved by The Big Guy, himself).

(image)



The Gift That Keeps on Giving: 5 Critical Changes to Cybersecurity Policy

Wed, 29 Nov 2017 17:41:24 GMT

2017 has been a particularly bad year for data debacles and cybersecurity breaches. Fortunately, federal and state governments, and companies—large and small—recognize that lasting, legislative change is required to prevent future cyber attacks and protect everyone’s data.

As we enter the season of giving, here’s what governments and businesses are offering to remedy past mistakes. The gift that keeps on giving? Progress in the form of policy change.

(image)



CBL Pictures: Burnt Bytes and Backups

Thu, 16 Nov 2017 21:10:16 GMT

Recently, we received this laptop for recovery. The fire had ravaged the client’s home, destroying the laptop, and the backup device sitting nearby.

(image)



October: National Cybersecurity Awareness Month

Tue, 24 Oct 2017 14:10:45 GMT

Self-driving cars. Artificial intelligence. Smart home technology. Voice-activated home assistants. Virtual reality. The stuff of popular science fiction is no longer fiction. The future isn’t ahead; it’s already here.

Once again, it’s National Cybersecurity Awareness Month (NCSAM).

(image)



Data Recovery on TV - Halt and Caught Fire

Thu, 19 Oct 2017 15:56:53 GMT

We always love to see data recovery in TV and movies. Real problems, techno-babble, and magical solutions. One of our favorite shows is AMC’s Halt and Catch Fire, chronicling the rise of early 80’s IBM-compatible development right up to the information superhighway of the 1990’s.

We’ve covered this show before; back in the first season one of the main characters has to call in his wife Donna (a better engineer than himself) to help with a burned hard drive, and she saves the data, and the day.

In the series finale episode we see Donna again tackling data recovery, this time for her desperate and distraught daughter.

(image)



Ada Lovelace Day

Tue, 10 Oct 2017 16:27:39 GMT

Ada Lovelace was a 19th century amateur mathematician who is held up as a symbol for women in science. Her tale is a fascinating one and earned her not only acclaim as the ‘first computer programmer’ but a day honouring her and celebrating women in tech.

(image)



Equifax: Zero Credit for Poor Handling of Massive Data Breach

Tue, 26 Sep 2017 19:04:43 GMT

“Based on the information provided, we believe that your personal information may have been impacted by this incident.”

Sound familiar? You and 143 million other people in the United States, the UK, and Canada.That’s right – Americans weren’t the only ones affected by the massive Equifax data breach.

It’s been quite a year for data breaches (many a result of escalating and evolving ransomware), but this situation was largely precipitated by Equifax’s negligence. Companies who feel they are taking extensive preventative measures can always do more. Being on the defense is not the same as mounting an offense.

(image)



Total Head-Crash on the Park

Fri, 18 Aug 2017 17:52:49 GMT

Every now and then our lab techs have some fun…. A solar eclipse over the U.S. and a classic song by Bonnie Tyler prompted this rewrite.

(image)



Back-to-School, Back to Secure: Security Best Practices for All Age Groups

Thu, 17 Aug 2017 20:36:12 GMT

Whether it’s coming to a grinding halt or a gradual slowdown, there’s no doubt about it: summer is approaching its end. But while the temperatures are decreasing, hackers are increasing their efforts targeting networks and users of all ages. Cyberattacks span payment card fraud, unintended disclosure, hacking, malware, insider leaks, and ransomware—these are only a few of the most common approaches.

Different age groups vary in online behavior and thus, are susceptible to different online scams, threats, and pitfalls. Understanding risk factors is the first step toward protecting yourself.

(image)



Speeding Up or Slowing Down?: 7 Cybersecurity Startups to Watch in 2017

Fri, 21 Jul 2017 16:12:13 GMT

Overall, a previously burgeoning startup marketplace has been in decline since 2016. Dark Reading cites the startup slowdown a result of reduced funding from venture capital firms. However, one industry continues to boom, despite the overall decline: cybersecurity.

(image)



Amazon Goes Grocery Shopping, Buys Whole Foods

Fri, 23 Jun 2017 18:55:06 GMT

More and more, businesses are looking for ways to blend brick-and-mortar stores with online services. The company that rules the online marketplace? Amazon. But Bezos is branching out.

(image)



Drivehenge

Wed, 21 Jun 2017 16:30:45 GMT

Marking the Summer Solstice…

(image)



WannaCrypt: The Ransomware That Makes You Wanna Cry

Fri, 19 May 2017 15:42:07 GMT

Ransomware isn’t new, but it’s been all over the news recently. Just last weekend, hackers launched a massive cyberattack that crippled hundreds of thousands of computers around the globe. Known as WannaCrypt—also called WannaCry or Wanna Decryptor—it is a particularly damaging brand of virus known as ransomware.

(image)



Paring Down the Data: Data Age 2025

Mon, 24 Apr 2017 15:34:53 GMT

IDC has released a long white paper, Data Age 2025, on the evolution of data in our lives, how we have moved through different eras of data and computing and highlighting key trends today. We break down the main points, talk about it’s new critical nature, and a bit about pizza toppings.

(image)



The Bits and Bytes of Backups: Why You Should Prepare for Data Loss

Fri, 17 Mar 2017 19:23:46 GMT

Feeling lucky?

Everyone feels lucky until they aren’t. Most people have a false sense of security and hold tightly to the belief that catastrophe “can’t happen to me”. Unfortunately, it can.

(image)



Loves Me, Loves Me Not: 4 Sweetheart Scams to Avoid This Valentine’s Day

Mon, 13 Feb 2017 16:38:22 GMT

With Data Privacy Day and Safer Internet Day behind us and Valentine’s Day just ahead, it’s time to take what we learned and apply it.

(image)



7 Security Resolutions for 2017

Mon, 16 Jan 2017 16:15:39 GMT

The New Year carries the promise of infinite potential. Yet again, individuals are engaging in the common practice of resolution-making. But the percentage of people who see these resolutions through to conclusion is shockingly low.

The proliferation of technology has made time more precious than ever. Our lives move faster, so we need to accomplish more in a shorter period of time. We’d like to offer 7 security resolutions that you should make — and achieve — in 2017.

(image)



CBL the Data-Saving Reindeer

Thu, 22 Dec 2016 17:13:33 GMT

You know Accounting and Sales, Marketing, and Finance.
Production, Logistics, Design Group, and Freelance.
But do you recall?
The most famous department of all?

(image)



How the Grinch Stole Your Data

Mon, 19 Dec 2016 17:54:07 GMT

(image)

E very human in Townsville stored data a lot…

(image)



How the Grinch Stole Your Data: 13 Do’s & Don’ts of Cyber Monday

Tue, 22 Nov 2016 10:07:39 GMT

(image)

Maybe data, perhaps, means a little bit more.

The tell-tale signs of Black Friday and Cyber Monday are riddled with exclusivity and immediacy, prompting consumers everywhere to swipe, slide, insert, and scan their way to the best deals.

However, while consumers are cashing in their hard-earned dollars, hackers are capitalizing on consumers.

(image)



HDD-Rex: King of the Hard Drives

Fri, 21 Oct 2016 18:38:51 GMT

CBL techs playing head games –

(image)

(image)



Piling Up - Pictures give a glimpse of e-waste recycling challenges

Fri, 21 Oct 2016 18:05:32 GMT

(image)

As the landfills pile up around the world, how safe is it for our discarded tech to end up in e-waste ‘mountains’?

This gallery of pictures from The Guardian gives a brief visual glimpse of the challenges of e-waste recycling and global efforts to reduce waste focusing on recycling operations in Guiyu, China.

(image)



October is National Cybersecurity Awareness Month

Wed, 19 Oct 2016 16:05:40 GMT

(image)

“In 2016, there have been 454 data breaches with nearly 12.7 million records exposed.”

If this statistic doesn’t scare you, it should.

October is dominated by Halloween: pumpkin carving, cider drinking, costume searching, candy eating, and Trick-or-Treating. Most people don’t realize that October is shared by another important event: National Cybersecurity Awareness Month.

(image)



You Shall Not Pass: The 10 Commandments of Password Protection

Wed, 21 Sep 2016 18:03:27 GMT

(image)

Lists confirm it: we are lazy when creating passwords. The sheer number of accounts, applications, and devices we own almost guarantees poor password quality. Employ these tips and best practices to fortify and protect your numerous accounts and devices.

(image)



Grey Skies Are Gonna Clear Up: 3 Data Recovery Solutions for Severe Weather Conditions

Mon, 15 Aug 2016 16:25:54 GMT

(image)

Summer means basking in the sunshine, swimming in the nearest body of water, and reveling in the great outdoors. What’s not to love about vacation season and ideal warm weather?

Unfortunately, summer is closely followed by hurricane season.

(image)



CBL Pictures: Fire Damaged Hard Drives

Fri, 22 Jul 2016 15:00:42 GMT

(image)

When we receive fire-damaged hard drives and computers in need of data recovery service, usually they aren’t in terribly bad shape. As you can see in these photos, unfortunately wildfires in Fort McMurray, Canada incurred extreme destruction on these drives. Sometimes the effects of a disaster are too much for recovery.

More pics after the jump …

(image)



Pokémon No-Go: What’s the Catch?

Fri, 15 Jul 2016 16:12:33 GMT

The mobile app, Pokémon Go, is a global phenomenon.

(image) Comfortably seated at No. 1 on mobile download charts for both iOS and Android users, the app has made virtual reality mainstream, prompting users to get off the couch and go explore the real world, but through a virtual lens.

However, people can collect a lot more than Pokémon.

We break down the basics of the game and look into some potential risks and threats to your data privacy, cybersecurity and more.

(image)



Plugged In: The Internet of [Every] Thing

Wed, 22 Jun 2016 16:47:22 GMT

(image)

The Internet of Things (IoT) is the biggest thing since the Internet. And it is, quite literally, huge. Notably, “the Internet is as much a collection of communities as a collection of technologies.” It connects computers and people. Now, the Internet far surpasses its original definition as a vast network of computer systems. It has expanded rapidly and could potentially include everything. In the Internet of Things, all kinds of objects and technologies can effectively “talk” to one another.

(image)



The Rise of Ransomware: How to Handle Data Hijacking

Mon, 16 May 2016 19:30:56 GMT

(image)

Ransomware is all the rage—and not in a good way. Cybersecurity experts are calling these virtual attacks an ‘epidemic’ of epic proportions.

In fact, its exponential growth over the past few years has left individuals, companies, and industries feeling both enraged and powerless.

Why? Well, because the only protection against ransomware is caution.

(image)



Fire Drill In Case of Data Disaster

Tue, 03 May 2016 17:46:48 GMT

(image) It’s Small Business Week and a perfect time for organizations to consider a data recovery fire drill to ensure business gets back in order in the event of a disaster, data or otherwise.

Hard drives in your computer system are not fail-safe and can and will fail for numerous reasons. Often those responsible for business IT may not be aware that one or more of the drives are acting up or about to go down causing major headaches for the users, owners and system admins alike.

To properly plan against a data loss crisis, running simulations now could prevent major headaches later. Check out our preparation tips after the jump.

(image)



Heads and Tales: Rescuing Data for Environmentalists Rescuing the Rainforest

Thu, 21 Apr 2016 15:48:59 GMT

For individuals who have had the good fortune of traveling to one of the most bio-diverse and less explored regions which still remains on the planet, the Durika Biological Reserve of Costa Rica represents 8500 hectares (21,000 acres) of pristine and beautiful tropical cloud forest managed by The Pro Conservation Foundation of the Durika Biological Reserve, a.k.a. the ‘Durika Foundation’. The Foundation, located near Buenos Aires, is a self-sustaining eco-community comprised of approximately 30 individuals who live permanently 1,650 meters (5,413 feet) above sea level to help conserve, protect and explore the land as well as to reverse the negative impact of modern agricultural practices on the mountainous landscape that the indigenous people—the Cabécar and Bribri—farm which is so vital to their existence, environment and heritage. For many individuals, the opportunity to travel to such remote parts of the world is not feasible. However cyber-travelers can venture to such exotic places via the internet and arrive at their destinations where photos may entice adventurers to one day visit. The Durika Biological Reserve is one such destination where images of its beauty have been captured to share with others. Through the research efforts of the individuals who make the Durika Reserve home as well as the visitors to the community each year, a vast array of previously unknown or recorded findings has been collected for five years on the flora and fauna which also make Durika their home. While a self-sustainable community that uses alternative energy sources, its members do leverage select modern technologies including a laptop computer upon which are stored the images of the flora and fauna captured by researchers and visitors. When Eugenio García López, biologist and ecologist with Fundación Durika, could not access the files on his laptop’s hard drive, he felt despair. “The photographs contained on the damaged external hard drive represented hundreds of hours and research of biologists in the rainforest or photographs taken while hiking through dense, virgin jungle where no one probably has ever been before.” [...]



Spring Into Action: Top 5 Do's & Don'ts of Data Cleanup

Tue, 19 Apr 2016 18:36:32 GMT

(image)

“April showers bring May flowers,” as they say. April also brings with it the frenzy of spring cleaning. This is the time of year when everything must sparkle, fit neatly into its predetermined spot, or go curbside. Everywhere and everything is fair game: your home, your garage, the interior and exterior of your car, your fridge, your office, and…your data.

Just like the clutter in your closet or garage, your data can be disorganized, old, poor quality, or redundant. Fortunately, de-cluttering your data will make your life (and business) run more smoothly in the long-term.

(image)



Here's a flowchart to help you decide if you should back up

Thu, 31 Mar 2016 15:07:33 GMT

World Backup Day is on March 31st! CBL supports the mission to increase awareness and decrease the incidents of data loss through avid worldwide data backup. It’s a good annual reminder about the importance of protecting your data. Check out the full chart after the jump.

(image)

(image)



How to Demolish Old Hard Drive Data (keeping your data safe, the logical way)

Thu, 24 Mar 2016 18:06:29 GMT

(image)

If you have a computer that you are getting rid of you need to take special care of the data you have stored inside it. Whatever information you have saved on the hard drive inside: photos, documents, financial files, passwords, emails — personal information, does not simply go away if you hit delete or drop stuff in the Recycle Bin.

Ben Popken at NBC did a video showing some low-tech solutions to this problem. He trashes hard drives with everything from hammers and baseball bats, to submerging in water and burning with fire. Watch the video after the jump.

(image)



Data Disasters: When a Big Data Loss Becomes a Giant Problem

Wed, 16 Mar 2016 20:59:11 GMT

(image)

Filing cabinets and safety deposit boxes are old-school. In this technological age, our personal, most valuable information is secured somewhere in the digital universe. It might be saved on an external hard drive or on an internal server. It might live in the Cloud, in an encrypted file, or in a Dropbox folder. Wherever your data is located, there’s no way to be sure it’s 100% safe or secure.

Disaster is inevitable. Sometimes it’s a fender bender or a stolen credit card. Other times, it’s a Big Data disaster.

What is Big Data?

Big Data is a recent ‘hot topic’ in the tech world. It is:

“A term that describes the large volume of data – both structured and unstructured – that inundates a business on a day-to-day basis. But it’s not the amount of data that’s important. It’s what organizations do with the data that matters. Big data can be analyzed for insights that lead to better decisions and strategic business moves.”

The second part of this definition is the critical piece; it’s not the amount of data, but what can be done with the data.

(image)



The Hidden Hazard: Protecting Your Organization from Insider Threats

Mon, 08 Feb 2016 17:38:20 GMT

(image)

Threats to the security and safety of your data are all around. Many people are familiar with the most common Internet dangers, such as Phishing scams, stolen passwords, browser vulnerability, and hackers. However, there’s another, more duplicitous danger at work. In recent years, Insider Threats have become a huge Cybersecurity concern.

(image)



Tips for Secure Online Shopping

Wed, 09 Dec 2015 15:32:15 GMT

(image)

Increasingly more people are opting to do their holiday shopping online rather than subject themselves to the chaos of crowded malls this time of year. Saving people time and energy over the hectic holiday season is no doubt a great benefit brought by the evolution of the internet, but it doesn’t come without its own unique set of evils.

Recent incidents of cybersecurity and data theft have brought light to the risks consumers face when sharing and entrusting their sensitive data with corporations and third party institutions. Malicious intentioned cyber criminals continue to develop new, tech-savvy ways to hack into people’s private accounts for the purpose of stealing sensitive information.

Protect your data while doing your holiday shopping online this month with these tips and safety precautions.

(image)



Spot Some of These Signs? Your Hard Drive May Be About to Fail

Thu, 22 Oct 2015 18:03:10 GMT

(image)

Hard drive failure is often a surprise but crashes don’t really come out of nowhere. You can often spot a potential drive crash before it happens if you know what to look for. This is useful ahead of time so you have a chance to get a backup in and save data.

Here’s a list of signs you may notice in your computer that might signal imminent drive failure.

(image)



Crikey! That's a Big Hard Drive Teardown

Fri, 11 Sep 2015 10:33:02 GMT

Look at the size of this hard drive – and we’re not talking about its capacity. No, not the ones pictured here…..watch the video after the jump to see the vintage.

(image)

(image)



Lessons on Data Safety from the Ashley Madison Hack

Thu, 10 Sep 2015 17:47:28 GMT

(image) No matter what your stance on the Ashley Madison cyberattack or where your interest lies, there is one important lesson that everyone should be taking from the incident: your data is not as safe as you think it is. The apparent vulnerability of sensitive data submitted online is cause for alarm and serious consideration.

(image)



Ten Years on From Katrina: Reducing Impact Key so Business Can Weather the Storm

Mon, 31 Aug 2015 19:58:14 GMT

(image)

10 years ago this past week Hurricane Katrina slammed into New Orleans. Many businesses were submerged in water and either partially or totally destroyed. Recovery planning is key but taking steps to reduce impact on business goes a long way to maintaining operations.

(image)



Tips: Reduce and Respond to Data Loss from Severe Weather [1]

Thu, 30 Jul 2015 15:14:23 GMT

(image)

Summertime brings with it a pretty consistent rise in data recovery requests at CBL related to the start of severe weather and storm season. Taking some simple precautions can go a long way to preventing data loss. Read our tips on preventing data loss and in case you’re affected, steps to take in response to weather damage.

(image)



Tis the Season: Planning Key to Avoiding Hurricane and Natural Disaster Data Threats

Mon, 20 Jul 2015 10:00:09 GMT

(image)

The annual arrival of hurricane season in the Atlantic reminds of the threat that severe weather and natural disasters can be to data and a business’s very survival.

(image)



Cybersecurity Threats Are Always Evolving

Fri, 12 Jun 2015 16:14:19 GMT

No Target Unturned.

(image)

It’s a connected digital world and as far as information technology goes threats from hackers to our data are always prevalent and evolving. Break-ins to computer systems have put IT departments on guard for data theft and espionage for years. One new corporate sector target is becoming a clear favorite for cybercriminals though. According to security firm research – the energy industry is now the sector with the highest number of reported attacks.

(image)



Preventing Data Loss from a RAID or Server Crash

Tue, 14 Apr 2015 11:58:00 GMT

CBL Data Recovery finds preventable mistakes at the core of data loss from RAID and Server crashes. Each day CBL Data Recovery deals with multi-drive servers and RAID arrays which have crashed causing panic, crippling data loss and potential financial loss to the companies who are dependant on those files. According to a recent IDC report, while worldwide server shipments were up 2.9% in 2014 the number of midrange servers jumped 21.2% driven on companies’ goals of consolidating IT infrastructure and taking advantage of the new virtualization environments available. Translation: more and more small and mid-sized businesses are putting most of their day-to-day business needs [eggs] into a single server [basket]. Virtualized environments give business the look and feel of having several different servers, functions and operating systems separated while actually running off of the same hardware. You can have the company file share on one server, accounting and CRM on another, and online order tracking on another – yet all these services are running from one physical machine. The small and mid-sized business segment is also the group that, unfortunately, ignores their IT investment the most. For the most part small and mid-sized business will not have a dedicated IT department. At best, it might be a couple of tech-savvy employees who also have other day-to-day responsibilities to take care of. Perhaps it’s the lean market times we live in, perhaps it’s an over-confidence in their own abilities, or perhaps it’s the apparent simplicity of running a server which contributes to the decision of not investing in maintenance or bringing in a managed service provider or IT specialist on a regular basis. A story we hear frequently at CBL by both IT groups and managed service providers is that a new small or mid-sized client called them after a server crash and the client has no idea how or why a failure happened. The situation has often gone so awry after multiple attempts by the client to rebuild a failed RAID array or restore incomplete or old backups that full recovery is impossible. Let’s take look at some of the hard truths behind these situations. [...]