The Backup Technology Blog

News, information & resources relating to the Cloud Backup, Disaster Recovery and Business Continuity industry.

We publish regular posts based on our experience of the market and the feedback we receive from new and existing customers. We encourage visitors to interact with the blog and post comments. If you are interested in finding out more about any of our solutions please contact us.

Points to Consider Before Selecting the Best Cloud Backup Provider

Cloud backup has become popular in the cloud technology space due to its automation capability, effectiveness and reliability. Advanced cloud backup technology offers a variety of services to customers and businesses. Therefore, it has become essential to consider basic factors before selecting a backup service provider. Businesses must know the relevant questions to distinguish between […]

Best Practises to Protect and Recover Data — Part II

In Part I, we discussed best data protection practices, such as developing plans, how to handle devices, checking for legal obligations, setting up metrics, and restricting access. In Part II, we will continue discussing further best data protection practices. 6/ Centralised Data Management It is important to update data through reporting, monitoring and policy enforcement through centralised management […]

Best Practises to Protect and Recover Data — Part I

Companies need to develop formal plans in order to protect valuable data and secure desktop and mobile devices. This means, firms require formal protocols for data recovery to retrieve information easily and quickly when things go wrong, like when natural disaster strikes. Cloud Limitations Despite improving reliability and decreasing costs, companies should not use only cloud storage option […]

Best Practices to Avoid Data Breaches

Most businesses do not have a pre-defined strategy to follow when sensitive information is stolen from their system. The complexities caused by data breaches are underestimated. Companies follow fortress approach and use encryption security, firewalls and proxies to keep intrusion away from sensitive data. However, once a data breach has taken place, what counts is the work done […]

Our Customers

  • ATOS
  • Age UK
  • Alliance Pharma
  • Liverpool Football Club
  • CSC
  • Centrica
  • Citizens Advice
  • City of London
  • Fujitsu
  • Government Offices
  • HCL
  • LK Bennett
  • Lambretta Clothing
  • Leicester City
  • Lloyds Register
  • Logica
  • Meadowvale
  • National Farmers Union
  • Network Rail
  • PKR

Sales question? Need support? Start a chat session with one of our experts!

For support, call the 24-hour hotline:

UK: 0800 999 3600
US: 800-220-7013

Or, if you've been given a screen sharing code:

Existing customer?

Click below to login to our secure enterprise Portal and view the real-time status of your data protection.

Login to Portal