In Depth
In Depth
Data protection regulations and compliance
-
Storage technology explained: Ransomware and storage and backup
We look at ransomware attacks, and the importance of good backup practice as well as immutable snapshots, air-gapping, network segmentation, AI anomaly detection and supplier warranties Continue Reading
-
Cloud-to-cloud backup: What it is and why you (probably) need it
Basic cloud data protection is just not enough. Several loopholes leave business data vulnerable and that means additional cloud-to-cloud backup should be seriously considered Continue Reading
-
Ransomware: All the ways you can protect storage and backup
We survey the key methods of ransomware protection, including immutable snapshots, anomaly detection, air-gapping, anomaly detection, and supplier monetary guarantees Continue Reading
-
SME disaster recovery: Five key points to consider
We look at key DR considerations for SMEs, including RPOs, RTOs, infrastructure needed for effective continuity and the right combination of cloud and in-house provision Continue Reading
-
Generative AI: Automating storage and backup management
We look at how generative artificial intelligence is being deployed to automate monitoring of repetitive tasks and report on enterprise storage and backup, but also the limits to its implementation Continue Reading
-
Backup in the age of cloud
The 3-2-1 backup strategy remains relevant in the age of cloud, giving rise to hybrid approaches that combine on-premise and cloud backups to minimise data loss, reduce downtime and improve redundancy Continue Reading
-
Generative AI: Data privacy, backup and compliance
We look at generative AI and the risks it poses to data privacy for the enterprise, implications for backup, and potentially dangerous impacts on compliance Continue Reading
-
Data classification tools: What they do and who makes them
Data classification is necessary for all organisations for reasons that range from simply putting data on the most cost-efficient media to ensuring legal and regulatory compliance Continue Reading
-
Backup testing: The why, what, when and how
We look at backup testing – why you should do it, what you should do, when you should do it, and how, with a view to the ways in which it will be made easier by forthcoming developments in backup software Continue Reading
-
Container storage platforms: Big six approach starts to align
Container storage is a complex but vital task. We survey the big six storage makers and see methods are starting to align around management platforms Continue Reading
-
Backup maintenance: Make sure backups can deliver
Deploying backup but overlooking the need to make sure it works is a common error. We look at the why and how of backup maintenance to help ensure you can recover from your backups Continue Reading
-
IT’s shift to the cloud: Veeam’s data protection report in detail
With half of servers in the cloud, most backup and nearly all disaster recovery cloud-centric, the shift to the cloud is significant – but container backup is one area that is yet to settle down Continue Reading
-
Top 10 storage and backup customer stories of 2022
Here are Computer Weekly’s top 10 storage and backup customer stories of 2022 Continue Reading
-
Ransomware, storage and backup: Impacts, limits and capabilities
We look at the impact of ransomware on storage and backup, how storage and data protection can best be used to combat ransomware, and how they fit in the fight against it Continue Reading
-
The next decade in enterprise backup
Backup set to adapt to deliver more security, ransomware protection and flash-speed restores, and deal with the complexity of multi-, hybrid cloud and container-based operations Continue Reading
-
Data classification: What it is and why you need it
To be compliant, to ensure data is optimally protected, that it is available, that it can be analysed and that it is stored most cost-effectively – these are reasons why data classification is vital to organisations Continue Reading
-
Ransomware and backup: Overcoming the challenges
Ransomware attacks that exfiltrate data don’t nullify the value of backups to restore from, but the challenges – such as not restoring corrupted data – require careful planning Continue Reading
-
Accountability in algorithmic injustice
Computer Weekly looks at the growing number of injustices involving algorithms and automated decision-making, and what can be done to hold governments and companies accountable for the failures of computer systems they deploy Continue Reading
-
Backup maintenance: Five key points to consider
Effective backups need to ensure all data is protected, and to track media and software changes. We look at five key things to consider Continue Reading
-
Cloud-to-cloud backup: When native cloud protection is not enough
There is a certain amount of protection built into cloud services, but it has its limits and full data protection requires that cloud data is secured with cloud-to-cloud backup Continue Reading
-
Kubernetes backup products and 10 key players
We look at 10 key players in Kubernetes backup, why they are needed, what they offer and why you need to watch out for duplication between application teams and the IT department Continue Reading
-
APAC buyer’s guide to backup and recovery software
In this buyer’s guide, learn more about the market for backup and recovery software and key data protection capabilities to look for Continue Reading
-
The limits and risks of backup as ransomware protection
Backups can provide a sound means of recovery from ransomware infection, but they are not 100% certain to foil attackers. We look at the limits and risks of depending on backups Continue Reading
-
Disaster recovery is an essential service for EDF with Phenix-IT
EDF has built disaster recovery tracking, planning and testing software on a six-month upgrade cycle based on governance, risk and compliance functionality in Mega’s Hopex platform Continue Reading
-
Snapshots vs backup: Use both for optimum RPOs
We look at snapshots and backup, the key difference, their pros and cons and how best to use the two approaches in an integrated data protection strategy for optimal RPO Continue Reading
-
Snapshots best practice: Five key things you need to know
We look at snapshots best practice, including the way they work, why they are not the same as backups, how to avoid heavy processing overheads and key user permissions tweaks Continue Reading
-
Backup types explained: Full, incremental, differential, synthetic
We look at backup – on-prem and cloud – and the key variants available, from full backup to synthetic full, via incremental, differential, incremental forever and reverse incremental Continue Reading
-
Cloud-era disaster recovery planning: Maintenance and continuous improvement
In the final article in this four-part guide to disaster recovery planning, we look at how and when to update, maintain, audit, review and continually improve the DR plan Continue Reading
-
Define RPO and RTO tiers for storage and data protection strategy
We look at RPO and RTO in defining data protection and disaster recovery strategies and how to specify tiers that reflect the importance of different systems in your organisation Continue Reading
-
Cloud-era disaster recovery planning: Staff training, incident and media management
In the third in a series on cloud-era disaster recovery, we set out the key components of DR staff awareness and training programmes, as well as incident management and dealing with the media Continue Reading
-
How open source is shaping data storage management
Open source data storage offers a great deal of flexibility, but unlocking its benefits will require strong technical resources to meet requirements such as stability, high availability and security Continue Reading
-
Cloud storage data residency: How to achieve compliance
There’s a conflict between cloud storage and the need to comply with local laws and regulations. We look at cloud data location, data residency, data sovereignty and data adequacy Continue Reading
-
Navigating PIPL: European businesses plot their next steps into China
How does China’s strict new Personal Information Protection Law impact European businesses? Continue Reading
-
Cloud-era disaster recovery planning: Setting strategy and developing plans
In the second in a series on cloud-era disaster recovery, we look at how to formulate a DR strategy and develop detailed DR plans for your organisation, while taking cloud services into account Continue Reading
-
Cloud-era disaster recovery planning: Assessing risk and business impact
In the first in a series on cloud-era disaster recovery, we provide a step-by-step guide to building firm foundations for the disaster recovery plan, with risk assessment and business impact analysis Continue Reading
-
Cloud storage compliance pitfalls: Post-pandemic and post-Brexit
We look at the key areas of cloud storage compliance that can trip you up, with shared responsibility with cloud providers and data residency among the most important Continue Reading
-
Immutable snapshots aim to neutralise ransomware
Snapshots – usually immutable anyway – get functionality to stop ransomware intruders moving or deleting snapshots, so customers know they have clean copies of data to restore from Continue Reading
-
APAC expert guide to storage management
In this expert guide to storage management in Asia-Pacific, we unpack the developments shaping storage management and key strategies to extract business value from data Continue Reading
-
Disaster recovery for SMEs: Five key areas to consider
We look at key disaster recovery considerations for SMEs, including why backup is not enough, how to create a disaster recovery plan, best-practice DR testing and DR as a service Continue Reading
-
Europe’s proposed AI regulation falls short on protecting rights
The European Commission’s proposal for artificial intelligence regulation focuses on creating a risk-based, market-led approach replete with self-assessments, transparency procedures and technical standards, but critics warn it falls short of being ... Continue Reading
-
How the pandemic changed backup
The Covid-19 pandemic forced big changes in how people work – we look at impacts on backup, including increased reliance on the cloud, plus security and compliance vulnerabilities and ransomware Continue Reading
-
Backup failure: Four key areas where backups go wrong
We look at the key ways that backups can fail – via software issues, hardware problems, trouble in the infrastructure and good old human error – and suggest ways to mitigate them Continue Reading
-
Backup appliances the hot topic for Pas-de-Calais fire brigade
With requirements for strict, long-duration backup and archiving, French fire brigade set out to replace optical media with a StorageCraft appliance and disaster-proof storage Continue Reading
-
The 3-2-1 backup rule: Has cloud made it obsolete?
The 3-2-1 backup rule was made for small-scale use in the pre-cloud era when tape still ruled. Is it relevant in the 2020s, or can we repurpose its fundamental principles? Continue Reading
-
Top five threats to compliance during the pandemic
We survey the top five pandemic compliance threats – remote working, Covid tracking, criminal exploits, compliance measures slipping, and heightened enforcement to come Continue Reading
-
Five ways that disaster recovery changes in a pandemic
Covid-19 has changed IT. Previously, working remotely was a business continuity measure, but now it is the norm. That means disaster recovery has to adapt to new risks and new ways to respond Continue Reading
-
Five key questions about Kubernetes backup answered
We look at when to back up containers, what to protect, the main methods of backup for Kubernetes and the main Kubernetes backup products available in the market Continue Reading
-
Cloud DR from the Big Three: Who’s best at what?
We look at cloud disaster recovery from AWS, Microsoft Azure and Google to see which is best for provision of turnkey solutions, breadth of portfolio and modular building blocks Continue Reading
-
Data Dynamics aims at single view of unstructured data
Data volume is ballooning, and storage is becoming more disparate, which makes the need for a single platform to manage storage and compliance a key requirement for organisations Continue Reading
-
Five key points about cloud vs in-house disaster recovery
The cloud is well suited as a disaster recovery failover option. The key questions are about what you should keep on-site and what goes to the cloud. We look at five key points to consider Continue Reading
-
Need to know: Five key things about backup testing
We look at five key things to consider when it comes to backup testing – what to test, how often, making sure backups work, whether recovery is effective and ensuring processes are consistent Continue Reading
-
Backup audit: What is a backup audit and why do we need them?
Backup and recovery are vital components to protect against data loss, whether technical or causes such as ransomware. So how can a backup audit help protect our key assets? Continue Reading
-
Erasure coding vs RAID: Data protection in the cloud era
Erasure coding has come to prominence with its use in object storage and, by extension, in the cloud. We run the rule over its pros and cons vs RAID data protection Continue Reading
-
Top five ways backup can protect against ransomware
Ransomware threatens to put your data beyond reach, so the best way to prepare is to have good-quality data you can restore from backup. We look at the key things to consider Continue Reading
-
Top five ways to benefit from tape today
We look at the benefits that tape can bring, including in backup and recovery, long-term and ‘warm’ archiving, compliance and WORM use cases and ‘air gapping’ to protect data Continue Reading
-
Double extortion ransomware attacks and how to stop them
As ransomware attacks increase, hackers are diversifying their tactics to get victims to hand over larger sums of money. We investigate the rise of double extortion attacks Continue Reading
-
Getting physical with datacentre security
Whether it is natural disasters, terrorism or break-ins, datacentres will be vulnerable to a range of risks unless they are physically secured. Here’s how you can improve the physical security of your datacentre Continue Reading
-
GDPR at two: How far we’ve come, how far we still have to go
Marking two years of the General Data Protection Regulation, industry voices weigh in on the state of data protection and privacy, consider what has changed, and what still needs to change Continue Reading
-
Malaysia’s data protection practices still have some way to go
Some Malaysian firms are not using data protection tools to the fullest potential, while others only think about data protection after a breach Continue Reading
-
Surveillance capitalism in the age of Covid-19
Could the Covid-19 coronavirus pandemic further consolidate surveillance capitalist practices and enterprises? Author Shoshana Zuboff warns Computer Weekly it is possible Continue Reading
-
What are the security priorities for the post-coronavirus world?
The Covid-19 pandemic is forcing massive change across the business world and things may never go back to normal. What does security look like in this new world, and what will buyers be prioritising? Continue Reading
-
Storage 101: Replication vs backup, and synchronous vs asynchronous
Storage 101: Can replication replace backup? What are the pros and cons of synchronous and asynchronous backup? What’s the best way to mix backup and replication? Continue Reading
-
Contact tracing: The privacy vs protection debate
The Covid-19 pandemic has necessitated extreme measures not seen in peacetime for over 100 years. Contact-tracing apps are being developed as a tool for managing the pandemic, but are they a step too far? Continue Reading
-
Snapshots 101: Array vs backup software
We run the rule over snapshots in storage arrays and backup software and find a range of capabilities that go from mere support to fully snapshot-centric approaches Continue Reading
-
A carrot-and-stick approach to fixing cyber security complacency
With a majority of IT decision-makers holding the opinion that their employers are complacent when it comes to data protection, we look at what needs to be fixed, and how to fix it Continue Reading
-
Storage 101: Snapshots vs backup
We go over the basics of snapshots. They are a quick and accessible way of protecting data, but they are not a substitute for backup. So how do you combine the two? Continue Reading
-
Multicloud storage 101: Pros, cons, pitfalls and strategies
Not putting all your eggs in one basket can be helpful to an enterprise’s resilience strategy. We look at multicloud storage and the benefits and pitfalls it brings Continue Reading
-
NAS backup: Which suppliers have gone post-NDMP?
NAS backup with NDMP has many drawbacks so some vendors have moved to a data management approach that tracks changes and allows for incremental forever protection Continue Reading
-
Top five compliance concerns for UK business in 2020
We look at the top five legal and regulatory compliance concerns for UK businesses in 2020. It’s a list that includes GDPR, the DPA, PECR, PCI-DSS and the CCPA Continue Reading
-
What’s the problem with NAS backup?
NAS backup has always been problematic, but what exactly are the issues with NDMP, and what are backup suppliers doing to make a decades-old storage staple easier to protect? Continue Reading
-
Top four compliance considerations for SMEs
We look at the key data compliance regulations that affect smaller companies – such as GDPR, the Data Protection Act, PCI-DSS and PECR – and some key industry-specific frameworks Continue Reading
-
Six disaster recovery pitfalls and how to avoid them
We look at some key pitfalls in disaster recovery, such as failing to plan, not testing the plan, not protecting backups, poor communication and neglecting the human element Continue Reading
-
Spread of Kubernetes spurs backup and disaster recovery products
Growth of containerised applications brings with it the need to back up and provide disaster recovery. But what do you need to protect, and who provides the products? Continue Reading
-
DRaaS decisions: Key choices in disaster recovery as a service
We examine the key decisions when considering DRaaS. Whether to go full self-service, assisted or managed will depend on what you need to protect and your in-house resources Continue Reading
-
Five ways that backup has changed since the days of tape
Back in the day, all this was tape, but times have changed, with cloud-to-cloud backup, cloud storage, virtual and physical backup appliances and myriad endpoint hardware Continue Reading
-
Five essential steps to a sound disaster recovery plan
We walk through the key steps to develop a disaster recovery plan – from risk assessment and setting recovery objectives, to the plan itself and a testing regime to keep it fresh Continue Reading
-
Get ready for CCPA: Implications for UK businesses
The California Consumer Privacy Act, a wide-ranging data privacy and consumer protection law, comes into effect on 1 January 2020. How does CCPA differ from the EU GDPR regulations and what are the responsibilities for UK businesses operating in the... Continue Reading
-
SME disaster recovery made easy with cloud, hybrid and HCI
Disaster recovery is a lot easier for small businesses than it used to be, with use of the cloud, hybrid cloud, physical and virtual appliances, and hyper-converged infrastructure all among the choices on offer Continue Reading
-
Taking responsibility for security in the cloud
From accidental leaks to full-on data breaches, maintaining security across cloud services is becoming a headache for enterprises. What questions should organisations be asking of their cloud service provider and, ultimately, whose responsibility is... Continue Reading
-
ICO says UK police must ‘slow down’ use of facial recognition
The Information Commissioner’s Office is calling for a statutory code of practice to govern how police in the UK deploy live facial recognition technology while controversy surrounding its use continues Continue Reading
-
How APAC firms can slay the storage management beast
The data deluge and compliance requirements are shaping how Asia-Pacific firms are approaching storage management issues in the age of cloud Continue Reading
-
French baby store modernises backup as Veeam handles 150TB a night
France-based maternity, baby and children’s store Orchestra needed to share IT resources between 700 points of sale across multiple time zones, and backup for 100 applications Continue Reading
-
Cloud snapshots and backups: How to protect data in the cloud
You often need more data protection than native cloud services will give. But should you choose backup or snapshots? And what about third-party backup in the cloud? Continue Reading
-
Unstructured data compliance: Obstacles and solutions
Stored unstructured data could be a black hole full of unknown risk. We look at the key dangers to compliance in unstructured data and some ways of mitigating the risks Continue Reading
-
Backup product approaches vary as they take aim at the cloud
Use of the public cloud for backup data is something all the backup software suppliers provide, but implementations range from simple S3 connections to expansive software offerings Continue Reading
-
A cloud compliance checklist for the GDPR age
The cloud is supposed to make things simpler, but when it comes to compliance, things can get complex. Here is a look at the essential elements of a cloud compliance strategy Continue Reading
-
Data protection, backup and replication in the age of the cloud
A data protection and backup strategy has to take account of the expansion of the sphere of IT, from the datacentre to the public cloud to devices and locations at the edge Continue Reading
-
Hyper-converged backup appliances bring flexibility benefits
Backup appliances in scale-out format allow data protection to be scaled easily by simply adding extra nodes. But is it an idea that’s ready for the enterprise? Continue Reading
-
Storage 101: Self-encrypting drives' benefits and limitations
Self-encrypting drives are a cost-effective way to ensure compliance in certain situations. We look at self-encrypting drives, what they’re good for and their limitations Continue Reading
-
Data protection for containers: Why and how to do Docker backup
Containers such as those from Docker are agile, lightweight and can be short-lived, but they and their data often need to be protected. We look at the key options available Continue Reading
-
How the internet of things and edge data impact data storage
Remote device data poses challenges for the datacentre, but edge processing, analytics and the cloud can help businesses profit from the promise of the internet of things Continue Reading
-
Flash vs 3D Xpoint vs storage-class memory: Which ones go where?
New media provide a range of options to speed workloads, from “old-fashioned” flash to storage class- and persistent memory. We help you exploit the storage performance hierarchy Continue Reading
-
Data recovery disasters: Kroll Ontrack on how it helps enterprises bounce back
Data recovery expert Kroll Ontrack provides a behind-the-scenes look at the challenges enterprises and consumers face getting their files and information back when disaster strikes Continue Reading
-
DR 101: The disaster recovery plan and disaster recovery strategy
We walk through the key steps and essential building blocks required to develop a disaster recovery strategy and how to write a disaster recovery plan Continue Reading
-
GDPR brings serious implications for data storage
New European Union data protection regulations put tough requirements on organisations that store “personally identifiable data”. We look at what is needed to achieve compliance Continue Reading
-
Backup testing: What to test, when to test, how often to test
We run the rule over what’s involved in backup testing in virtual and physical server environments, how often you should test and the key pitfalls to avoid Continue Reading
-
Time to restore from backup: Do you know where your data is?
Making a backup is only the start of the process. You must be sure you can restore, that backups contain what you need, and that they will work with the applications that need them Continue Reading
-
Disaster recovery testing: technology systems to test DR
In this concluding part of a two-part series, Computer Weekly looks at ways of testing disaster recovery plans, with methods including array-based replication and hypervisor-based approaches Continue Reading
-
Disaster recovery testing: A vital part of the DR plan
Disaster recovery provision is worthless unless you test out your plans. In this two-part series, Computer Weekly looks at disaster recovery testing in virtualised datacentres Continue Reading
-
Lauri Love: the student accused of hacking the US
How did a brilliant but fragile computer science student from a rural English town end up facing life imprisonment in the US? Computer Weekly speaks to Lauri Love Continue Reading