Marguerite McNeal's picture

Break In a New PC with Seamless Data Migration

Congratulations, you got a new computer. Whether it’s a graduation present or the perk of a new job, the device gives you a clean slate. But what about all the documents, settings and applications stuck on your old machine?

Here are a few tips for safely moving data and configurations from an old PC to a new one.

Archive files you don’t need

New PCs present opportunities to de-clutter and organize all the files users haven’t touched for years. “Consider archiving them instead of putting them on your new machine,” software analyst Jill Duffy writes in PC Magazine. “Seeing as you've got that clean slate of a new computer, why not keep it clean?” Duffy recommends archiving any files older than three years.

Back up, and back up some more

Jeff Loeb's picture

If Backup Isn't Easy, It Won't Work: 8 Noble Truths

To help organizations better understand the challenges of backup, disaster recovery and secure access, Acronis has created the "8 Noble Truths" of data protection. To view all 8 Noble Truths, please download the whitepaper. This is the final post in an eight-part series to help you protect your data:

Acronis's picture

Acronis True Image Makes TopTenReviews

Earlier this year, TopTenReviews.com rated Acronis True Image a 9.9 out of 10 in their annual Data Backup Software Review. TopTenReviews verdict was, “Acronis True Image is among the top backup software options because it is simple to use and has a full range of backup and recovery tools.” Here, TopTenReviews discusses why Acronis True Image rated so highly and what organizations should keep in mind when selecting a data backup software solution. 

How Acronis True Image made TopTenReviews.com

Maeghan Ouimet's picture

Data Breach Costs Rhode Island Hospital

Women and Infants Hospital of Rhode Island (WIH) agreed to pay $150,000 in a settlement with the Massachusetts attorney general's office on Wednesday following a massive data breach that included the loss of personal information of nearly 12,000 Massachusetts-based patients. 

The case began in April 2012 when the hospital realized it was missing 19 unencrypted backup tapes from two of its prenatal centers (one in Rhode Island and the other in New Bedford, Mass.). According to the Associated Press, the tapes contained ultrasound images, patient names, and, in some cases, social security numbers.

Megan Van Vlack's picture

City Governments Turn to the Cloud for Data Recovery

More U.S. cities are striving to improve their outdated IT operations — an effort that could save these local governments time and money. Migrating data from legacy data centers to the latest architectures and tools is a complicated process that can be timely and can result in data loss if not carried out correctly. To simplify the process and save on costs, these government agencies are using the cloud in a backup role, as a resource to absorb any data spikes that can occur and as a disaster recovery unit. 

When Asheville, N.C. needed to upgrade its data center, the city was facing a tight budget that only had room to support disaster recovery plans for a limited amount of applications. With the cloud, the city was able to move its disaster recovery operations to a usage-based pricing model that enables the city to use the cloud as a backup as needed during a disaster instead of paying for the ongoing costs of operating an entire physical disaster recovery unit. 

Jeff Loeb's picture

When Choosing a Data Protection Technology, Remember: Flexibility Matters

To help organizations better understand the challenges of backup, disaster recovery and secure access, Acronis has created the "8 Noble Truths" of data protection. To view all 8 Noble Truths, please download the whitepaper. This is the seventh post in an eight-part series to help you protect your data:

IT departments are contending with several seismic shifts, including the rapid adoption of mobile, cloud and virtualization technologies in the workplace. But the consumerization trend, perhaps more than any other, highlights the desire among employees to use simple and flexible tools to do their work.

Marguerite McNeal's picture

To Protect Valuable Health Data, Address the Human Factor

Data breaches at Target and Neiman Marcus last year served as a wake-up call for retailers and customers alike to shore up their data protection. But health care organizations have been slower to follow suit. Earlier this year the FBI warned the industry that it’s particularly vulnerable to cybersecurity threats compared with other sectors.

Courtney Buchanan's picture

3 Tips for Banks to Mitigate BYOD Risks

Banks collect and store mountains of data about transactions, customer accounts and trades, and the majority of that data is highly sensitive. Last December when Barclays failed to properly back up electronic records, emails and instant messages, it faced a $3.75M fine. A failure to back up financial data violates U.S. regulations and has a severe impact on a company’s reputation and database.

In the BYOD era, financial institutions face the same challenge as other industries when it comes to securing mobile data. Bill Carey, vice president of marketing and business development at Siber Systems, notes three solutions to the most common security threats for banks, according to InformationWeek:

Marguerite McNeal's picture

Behind the Design: How One Art Director Protects Her Work

New research backs what IBM founder Thomas J. Watson said more than 50 years ago: “Good design is good business.” Design-driven companies have outperformed the Standard & Poor’s 500 stock market index by 228 percent in the past 10 years, according to an analysis from the Design Management Institute and consulting firm Motiv Strategies.

Maeghan Ouimet's picture

Report: Data Breach Cases Rise, Companies Must Rebuild Trust

It's safe to say you've entered your personal information at some point online. Whether it's a new doctor form, a purchase form, or a crowdfunding campaign, most people in today's world have given some pretty intimate details away on the Web. Before the advent of the Internet, this information was usually stored in a file folder behind a desk. Today, though, if not protected properly, it can show up in a myriad of unwanted, sometimes very public places.

Pages