24 Feb

Employees Leaving? Why You Need to Back-up Their Hard Drives

Employees come and go at various times throughout the year. However, the number of people that tend to switch employers is typically much higher from mid-January through the end of February.

Employees Leaving Why You Need to Back-up Their Hard Drives

Most employers tend to put off hiring new employees over the holidays. If they follow a traditional fiscal year, January is when new budgets begin that include creating new positions and hiring new employees.

Anytime you receive notice an employee is leaving, it is vital to do a full back-up of their hard drives and other storage devices. It is not uncommon, even with network and cloud-based storage, for employees to download and store company data and files on their computer’s hard drive, on jump drives, on company issues smartphone and tablets, and so on.

There are various methods you can use to perform a full data back-up. You could upload the data to your network or cloud-based storage. You could copy data onto an external hard drive or USB drive. You could even clone the drive onto a different computer using the right software app. No matter which method you choose, you will want to start the process sooner rather than later.

On the off chance the employee is disgruntled for any reason, the last thing you want to deal with is attempting to recover data from a hard drive or other storage device they formatted. Even though there is always a possibility the data might be able to be recovered, this should be your last option, not the first.

You will also want to start to transfer their job responsibilities, data files, projects, other such business critical tasks to other employees. This helps eliminate any risks with the employee deleting, accidently or on purpose, any vital data you will still require after they leave your business.

Data Back-up Tip: Do not forget to also make a back-up of their email file. There could be important communications and you want to make sure nothing goes missing or falls through the cracks.

Aside from ensuring your company’s data has been backed-up, there is one other important thing you need to do: Disable all of their user accounts. Some employers overlook shutting off access to various systems after employees leave.

In some cases, like where employees connect to a virtual server, they could still have access from their home computers. Furthermore, after disabling the accounts and access, you should delete them entirely. You do not want to end up with numerous accounts that are inactive and could still potentially have access to one or more areas you overlooked.

Companies that have multiple accounts from departed employees place their network and data at risk of breaches from hackers. These accounts are often prime targets for hackers since they are not being used. Once a hacker gets access, it could create even more data nightmares for your business.

If you have a hard drive or storage device that was accidently erased or formatted by a former employee, or have one that fails unexpectedly, please feel free to contact Taking It Mobile at 888.877.5002 or 1-888-Call-TIM today to discuss potential data recovery options!




Share this
20 Jan

What Will Become of Hard Disk Drives in the Future?

One question a lot of people have is what is going to happen to hard disk drives (HDDs) now that we have solid state drives (SSDs). One might assume that SSDs are going to displace HDDs much like DVDs did to CDs and Blu-rays have done to DVDs. Before you start buying up all the HDDs on the market to have a supply in the future, you need to know HDDs are not going anywhere.

What Will Become of Hard Disk Drives in the Future

First of all, the cost for high capacity SSDs is quite expensive once you start taking about terabytes of storage space. Many people and businesses still cannot afford to cross over that threshold. Not surprisingly, HDDs with larger terabyte drives tend to cost less and fit the budgets of most people and businesses better.

Next, SSD is still a fairly new technology. This means the costs of the technology have not equalized and started to decline yet. It could be another ten years before prices on SSDs become more competitive with HDDs.

Another reason HDDs are not going anywhere is because two of the biggest HDD manufacturers have released information on new HDDs in development. Both Western Digital and Seagate have announced they are working on much bigger and faster HDDs.

Currently, you can find 8 TB, 10 TB, and 12 TB HDDs, with plans on a 14 TB drive sometime later this year. Both manufacturers have plans to keep increasing the maximum drive space up to 40 TB within the next five to seven years.

Increased storage capacities is just half of what is to come with HDDs. Both of these manufacturers are also working on different ways to improve the performance and speed of HDDs – one of the big selling points right now for SSDs. If these manufacturers can develop an effective method for increasing speeds of HDDs, then they will be even more competitive with SSDs.

Currently, the platters within HDDs have actuators arms on top and bottom which read and write date to the platters. However, while all the actuators do move in tandem with each other, only one is actually writing to the platter at a time.

One possible method that is being explored is the use of multiple read/write actuators. Using this method would allow for two (or more) sets of actuators to be used to read and write data simultaneously on the platters. This would effectively double the speed of HDDs.

This idea is not new, but has been impractical for numerous years because of the costs to develop it. With recent advances in technologies, now the costs for the components to develop faster processing HDDs has dropped. So it is no longer a possibility, but something that is actually being developed.

Both the increased storage capacities and faster speeds are great news for HDDs as they are given a new lease on life. No matter whether you use HDDs or SSDs, always remember to back-up your data on a regular basis. If you forgot and your HDD or SSD crashed, it may be possible to recover data using our data recovery services by calling Taking It Mobile at 888.877.5002 or 1-888-Call-TIM today!

Share this
25 Dec

Email Flaw Makes Phishing Easier with “MailSploit”

Phishing email attacks are nothing new. You get a bunch of random emails that look like they were sent from known friends and businesses. Yet, when you hover over the actual email address you see that it is fake with some weird string of numbers and letters, so you know it is a phishing scam.

Email Flaw Makes Phishing Easier with “MailSploit”

Many email clients also have features where they look for these types of emails and move them to a “spam” or “junk mail” folder. Some clients even allow you to mark the emails as phishing scams. However, even with these advances, there is a new vulnerability that is making it easier for those individuals and groups that practice in “black hat” phishing scams called “MailSploit.”

The vulnerability was discovered recently by a security research technician in Germany named Sabri Haddouche. The vulnerability has to do with how email clients interpret the data in the “from” data field in emails.

Currently, there is an old standard still in practice by numerous email clients from 1992 that is called RFC-1342. This standard requires all header data in emails to be converted into ASCII character data. If the email client encounters non-ASCII formats, it converts it into the appropriate ASCII character.

Where the vulnerability stems from is after the email clients convert non-ASCII data into ASCII character formats, the clients never go back to re-scan the header data for malware or viruses. In addition, there is a secondary vulnerability that can be hidden within the header data content.

The RFC-1342 standard also cannot address issues with multiple email addresses in the header data or null-byte data types. In other words, if the email client encountered two or more email addresses in the header data, the only one read and verified for ACSII format is the first email address.

As a result, hackers and others that use “black hat” tactics could essentially hide malware, viruses, and other payloads using one or both of these vulnerabilities. For email recipients, it would appear like the email came from someone they trusted and knew.

Upon opening the email, there could be a “trigger” that installs a malicious program or virus onto the device. In some cases, there could be clickable links embedded in the email and once clicked, download and install malicious programs onto the device.

There are thirty-plus email clients affected by the vulnerability. However, Gmail is not one of them. Those email clients affected include:

  • Mozilla Thunderbird
  • AOL Mail
  • Outlook
  • Yahoo! Mail
  • Opera
  • Mail for Windows 10
  • Spark
  • Apple Mail of iOS/macOS
  • ProtonMail

Out of the affected email clients, so far eight companies have released patches to fix the vulnerability and a dozen others are in process of developing a patch to fix the problem.

In the event you accidentally open a phishing email that causes your device to crash or causes your storage device to fail, please feel free to contact the data recovery experts at Taking It Mobile at 888.877.5002 (1-888-Call-TIM) today!

Share this
18 Nov

Signs Your Computer Has Been Hacked

The sense of protection knowing we have an antivirus, anti-malware, and anti-spam software installed on our devices can lead to a false sense of security. Today’s hackers and cyber attackers are developing malicious apps and other hacks faster than the software companies that offer protection can respond.

Signs Your Computer Has Been Hacked

Knowing how to tell if you have been hacked sooner, rather than later can help stop potential data loss and avoid identity theft. Some telltale signs you might notice could include: read more

Share this
24 Oct

Protect Yourself from Ransomware with Regular Data Backups

Ransomware has been a trending topic in the IT industry that is not going away. Initially, businesses were targets of these “black-hat” operatives, who would hold their data “hostage” until a ransom was paid.

Some businesses that were hit had their proprietary data held hostage. Sadly for them, they did not have a data backup to turn to. As a result, several of the businesses ended up paying out thousands to tens of thousands of dollars or more just to have their data released.

Protect Yourself from Ransomware with Regular Data Backups

In some cases, even after the business paid the ransom, the data was still not released and the ransomware remained on the computer. Today, ransomware attacks have expanded from businesses and now are also affecting individuals. read more

Share this
21 Sep

Does Your Backup Need Its Own Backup?

You never know when you will go to turn on your computer and hear a “click, click, click” of the hard drive and nothing happens. But, computers are not the only devices at risk of failure. Your smartphone or tablet could also fail at any time from being dropped or some other type of malfunction.

Does Your Backup Need Its Own Backup?

Even though people have numerous options available to back up their data, there are still many who do not. In addition, there are different types of data backup methods and using the right ones are equally important. Depending on which ones you use, your backup might need its own backup, too. read more

Share this
28 Aug

Are There Safety Issues with Cloud-Based Storage?

Apple’s iCloud has been under attack recently by hackers with different incidents going all the way back to January of this year. The more recent ones, were a series of threats that made the news in late March. This raises the question of just how secure Cloud-based storage really is and whether uploading all of your data to the Cloud is truly safe.

Are There Safety Issues with Cloud-Based Storage?


Here’s what you need to know: read more

Share this
20 Jul

Are Personal Computers Going Extinct?

In recent years, the number of personal computer (PC) sales for both desktop and laptop computers has been on a steady downward decline. Part of the reason for the reduction in sales stems from people being able to do most everything they want on their smartphone or tablet device, and even some things they cannot on a PC.

Are Personal Computers Going Extinct

Some analysts are predicting the PC will be extinct within the next ten to fifteen years as new and emerging technologies continue to change how people access content offline and online. Others have a more reserved look at this technology market segment and believe the PC will still be around for quite some time. However, the PC as we know it will be transformed to make it more competitive with portable devices. read more

Share this
10 Jun

Computer Repair: Securing the Data on Your Hard Drive

We all store important and private information on our computers, whether we use them for business or personal reasons. While our computers are reliable most of the time, one of the biggest fears we have is when we push the power button and nothing happens. The computer will not start up and just sits there, or worse it displays an error message stating the BIOS cannot find a bootable device.

Computer Repair: Securing the Data on Your Hard Drive
At this point, it is obvious something has gone wrong and the computer needs to be repaired. For many small and medium sized business owners, this means having to ship the computer off to the manufacturer or take it to a local computer repair service. Whichever method you use, it is not uncommon to be asked to include the user name and password to log into the computer.
read more

Share this
26 May

How to Safely Dispose of Old Smartphones

If you like having the latest model of your favourite brand of smartphone, whether it be Apple, Samsung, LG, or Sony, you will most likely invest in the newest model every year or two. Initially, you may decide to keep your current phone as a “back-up” phone in case your new one gets damaged. However, eventually, you will end up with a collection of smartphones sitting around your home.

How to Safely Dispose of Old Smartphones

What do you do with all of those smartphones? There are several different options to get rid of them. With each of these, it is important to take certain precautions before disposing of the phone to ensure your data and personal read more

Share this

© 2017 takingitmobile. All rights reserved.

WordPress Video Lightbox Plugin