Category Archives: Data Security

How to Share Files Online Securely

It is abundantly clear that the Internet, cloud backup, cloud computing, and data storage are changing the way that businesses operate from the ground up, and the trend shows no sign of slowing down. Through the use of these new modes of technology, everyday more and more small to medium-sized businesses are finding it easier to compete with the big corporations as virtualisation and cloud computing become increasingly affordable, and thus accessible, to everyone. At the very centre of this revolution lie the cloud backup and storage service providers, whose advancements in security, file sharing ability, and collaborative computing continue to lead the way in changing how data is being protected and shared by businesses of all types.

Online data backup company’s servers create a virtualised network that is both easy to access for the user and, in order to avoid the possibility of anyone’s data falling into the wrong hands, security-intense in nature as well. This is achieved through the use of advanced methods of file encryption, both while data is being transferred to and from the online backup company, and while in storage on the online backup company’s servers. The servers themselves are run by special software that effectively restricts data access by creating virtual “road blocks” between the files of all users on the system. In addition to this, users can only gain access through a vigorous authentication process, further ensuring the safety of the all the data on the network.

Storing and accessing your company’s data online offers increased flexibility in being able to allow other users to easily access and edit your files. The versatility in which users can share files online is continuing to grow, with nearly all online data storage companies now offering some level of file sharing capabilities. The end result of this is the virtual network ability between any and all computers, with the restrictions of having to be in physical proximity to any individual that you wish to collaborate with becoming less and less important all the time. In addition to this, companies that are taking advantage of these virtualised cloud storage servers end up appearing to their customers and associates to have vastly larger and quicker databases than they would be able to afford and maintain on their own, further levelling the playing field between smaller and larger businesses.

The control of which files are only accessible by the original author and which ones will be shared with other users on the network is, of course, left entirely up to the subscriber. In fact, once the cloud backup service provider’s software client is installed on a business’s computers, they will instantly have control over a whole host of varying levels of security protocols, including the ability to assign users within their own localised networks, and in the cloud, as well. Clients of cloud backup and data storage can stay on top of what is happening with their data through the ability to monitor who has or hasn’t accessed files. Different files can also receive varying degrees of security measures as well, through the creation of multiple user passwords and special, classified links that can be emailed to individuals for temporary access privileges to specific files and folders specified by the user.

File sharing and cloud based data storage is not without its risks. After all, no matter what complex levels of security are supposedly being used, this is still your data we’re talking about here! For this reason, it is of the utmost importance that you choose an online data backup service provider with a proven track record and state of the art security methods.

Backup Technology Limited is so proud that it has never been hacked in any way. It attributes this mostly to the bank grade level of encryption that it employs to all the data on its servers, ensuring that your files are only shared with those whom you deem fit. For more information, please visit

TechTrade Yorkshire - Backup Technology

ClouDRaaS at TechTrade Yorkshire

We are delighted to announce that we are exhibiting at the inaugural Techtrade Yorkshire event at Elland Road in Leeds on September 8th.

The whole day promises to be a great opportunity for everyone working in the IT industry in the region to learn from and network with each other as well as the region’s business leaders.

There are some great speakers lined up and our Disaster Recovery specialists will be on hand on Stand 43 to demonstrate our world-leading ClouDRaaS solution and to discuss the challenges you face around data and your IT infrastructure.

If you would like to book an appointment please click here to give us your details.

You can find out more about event here. Tickets for IT decision-makers are FREE.

Look forward to seeing you there!


Points to Consider Before Selecting the Best Cloud Backup Provider

Cloud backup has become popular in the cloud technology space due to its automation capability, effectiveness and reliability. Advanced cloud backup technology offers a variety of services to customers and businesses. Therefore, it has become essential to consider basic factors before selecting a backup service provider. Businesses must know the relevant questions to distinguish between business grade and customer-focused services in order to meet their needs.

Versatility and Performance

Companies could reduce data backup time if they choose a cloud backup services.  It is a specialty service that provides not only faster backups, but also faster restores as compared to traditional options, like tape.

There are many backup service providers that offer remarkable figures to show how helpful their procedure is in minimizing the data volume that is backed up on daily basis. The statistics differ in various environments, so it is essential to get proof of advertized statistics. In addition, the service must support different type of platforms and apps like Mac, UNIX, Linux, Windows, Oracle, Dynamics, SharePoint, SQL Server, VMWare, Hyper-V, and Microsoft Exchange.

Questions to Ask:

1/ How does the duplication process work? Is the process file level or block level?

2/ What is the type of applications and operating systems that are supported by this technology?

3/ Is it possible to use a customized service to meet business needs?

4/ Is it a hybrid cloud supported service?

Compliance and Security

When companies manage confidential information, it is obligatory to consider compliance and security measures. Many service providers give guarantees of encrypted data at all stages. They make sure that the encryption key is not accessible by employees or other third party service providers.

Some service providers are ISO certified, perhaps ISO 9001 and ISO 27001. These certificates give proof that the service provider has serious intentions towards data protection and management.

Some companies are unwilling to backup their data outside of Europe or USA due to security concerns and legislative issues. Before selecting a service provider, companies need to check as to where the data will reside.

Questions for Comparing Service Providers

1/ How does this service provider encrypt data?

2/ Does the provider focus on consumers or is it a business solution?

3/ What are the types of data centers in which data will be stored?

4/ Will the service provider deduplicate data? If so, what is the procedure of deduplicating encrypted data?

5/ Is the provider certified for an ISO? (ISO 9001 and ISO 27001)


Pricing is an important factor for businesses while considering a backup service provider. Transferring expenses from CAPEX to OPEX model is a significant factor; as many companies have a preference for CAPEX for accounting purposes. Some service providers can give high value and quality service with reasonable rates that can meet business needs of all customers.

Questions to Ask

1/ Does the provider charge for download and upload of data?

2/ Does the price depend on licensing or cost per GB?

3/ Are there any extra charges?

4/ Does the provider send quarterly, monthly or annual bill with arrears or in advance?

Availability and Service Levels

To select a reliable platform, get some references from existing customers in similar industry. Companies can ask about assurances related to uptime, downtime, the type of disk to save data (age, RAID and drive specification), nature of resilience in network, location of the support team and their availability through email and telephone.

Vendor lock-in

Before finalizing a provider, ask about their shortest contract period and the level of services they provide. Inquire about restrictions regarding terminating the service, cost and procedure for accessing and downloading data after cancelling the agreement.


Best Practises to Protect and Recover Data — Part I

Companies need to develop formal plans in order to protect valuable data and secure desktop and mobile devices. This means, firms require formal protocols for data recovery to retrieve information easily and quickly when things go wrong, like when natural disaster strikes.

Cloud Limitations

Despite improving reliability and decreasing costs, companies should not use only cloud storage option for securing data. Instead, they should have both offsite and local backups for maximum protection. Access to data in the cloud is always dependent on Internet connection, but during Internet outage, it is easy to access data quickly.

While data protection practises vary from company to company, the best practises remain universal:

1/ Develop Plans

Before choosing the best data protection practises, firms must understand the significance of creating a formal plan. If there is an established written disaster recovery plan, then employees can get detailed instructions regarding the management of data. Moreover, the written plan can remind the employees to treat company data as a critical asset of the organisation. Planning helps in discovering new data sets that were not found before, giving additional insight into the nature of the company data.

2/ Handle Devices with Extreme Care

Hard drives are sensitive; therefore, treat these devices with care, avoiding exposure to liquids and extreme heat. SD cards are excessively used to store videos and photos. Firms should treat these cards carefully as they are very sensitive as even simple static charges could affect these devices.

3/ Follow Regulatory and Legal Regulations

Make certain that company’s plan is cross-checked with regulatory and legal requirements. To protect information and to save the firm from lawsuits and fines, it is necessary to exceed these regulatory requirements.

4/ Set Up Various Metrics

When tools for data protection are selected, firms need to make sure that they are working appropriately. Metrics help you identify any policy violations, employees are trained adequately, and all data is encrypted at all levels.

5/ Restrict Access

Employees have access to valuable data, so there must be some established access controls to avoid mismanagement and chances of theft. It is unfair and risky to give complete access to one employee. Make certain that there are a number of staff members who have access to data. Moreover, there must be some plans that can work when some employees leave the company.

In Part II, we will discuss additional best data protection practices, like central data management, the roll of employees in data recovery, testing DR plans, and more.

Is it Safer to Backup Data in the Cloud?

Data backup and protection is an important matter; and it becomes more sensitive when you try to backup data to an offsite server with the help of cloud based services. Although the concern is understood, cloud based data is automated, very safe, efficient, and the data is backed up to geographically dispersed locations, typically far away from the origin.  As a result, natural disasters, such as tornadoes, wild fire, floods, etc. won’t affect it.  The system is also efficient because it doesn’t require hardware changes and more storage space is always available for the users. But, is it safe for everyone? Is there any chance of hacking? I will give answer of these questions below.

Keep in mind that not all cloud backup services are the same. They differ in technology, years of experience, and management. But, one thing is clear that you must know your wants and needs when it comes to protecting your data.

Where is the Data Stored?

The cloud has become more popular, but most don’t seem to know what it actually means. Most of the people have concept that using the data storage service is risky because they think that all the data in the cloud usually go to a cyberspace where hackers can easily go and access it without any problem.

Well, this could be true if you are not using reliable data storage services. Cloud is a very simple service with data servers in data centres, connected with the main storage and user’s personal account. Internet is a network of servers that carries the data to and from data centres, just like a highway is for vehicles.

Data centres are very protective areas where highly skilled and reliable workers are appointed for the management of servers. In most of the cases, only a few reliable persons are given access to these data centres. The workers are allowed to access the data centres with several physical security options and with the permission of users, who provide the secret PIN to open the storage vaults. Video surveillance system is used for 24x7x365 in order to ensure security of data. Many do not label their data centre as “Data Centre”, for security reasons; they are just typical buildings that blend with the neighbourhood buildings.

Data centres can not be physically robbed. We have never heard such stories. However, it has a cyber-based system linked to the computers of users. No doubt that there is a minimal risk of cyber-crime or data hacking, but it is very rare, because cloud backup companies have come up with sophisticated systems that can keep hackers off their servers.


Is backing up in the cloud really hackerproof? The simple answer is yes and no. If the technology used is a sub-standard, hackers can get access to the data centres with the help of specialised hacking protocols. However, the latest security systems have made it very difficult. For instance, multiple security levels (using emails, phone numbers, and physical statements) have made it almost impossible for hackers to access and compromise data.

Your data is much more secure being backed up in the cloud, where it is handled by qualified security experts than it is in the basement of your home.  Modern security applications and tools are implemented in order to ensure that there will be no risk. On the other hand, users are also encouraged to monitor the activities.


Mitigating Security Risks in the Cloud

Many understand the importance of data and agree that data should be protected in an efficient manner.  Companies are also realising that moving essential services to the cloud — from CRM to voice to communications — has many advantages.  In order to develop an efficient data protection, storage and transfer protocol, most rely on the cloud. The Cloud based models are more flexible, efficient, scalable, and integrated. These have great potential to save money. On the other hand, careless, unplanned migration to the cloud could bring its own issues and risks, and therefore, a careful well thought after plan is needed before migrating to the cloud.

Data breaches have become a daily global occurrence these days. Leading organisations, associations and groups are facing security threats on a daily basis. So, how do you minimise the chances of data loss or breach?

The cloud enables the users to store data in multiple locations for easy access and restore in case of a disaster. It is very important to have all your security related questions answered from the vendor you are planning to use.  Here are some tips for users who want to reduce the risks while moving to the cloud.

Get Answers to your Security Questions:

Get connected with the online representatives and ask the basic security questions. It would be better if you discuss the concerned security matters with the experts and find out if they align with yours. In most cases, the clients ask following questions:

What type of data protection strategies does your company use to avoid data loss?

  1. Is customer support available for 24/7?
  2. What are the modern techniques (feature sets) being used to protect my data?
  3. Any data breach at your company? If so, tell me how you handled it?
  4. Do you have a security checklist template that we can check?

Partnering with a cloud based service provider has added benefits, as the provider has its own experts in house that can monitor up-time, implement security measures, monitor services around the clock, and implement necessary protocols to protect and backup the data.

Always check the proper security facilities and features. This can be done by checking the history of a cloud service provider (for instance, by talking to present and former clients, reading reviews online).

Consider the following four factors to evaluate cloud service providers:

  1. Secure facility for storage: The cloud service provider should provide details about the security of their storage facilities. While digital security is important, security of the actual physical premises and the employees who work there are also very critical.
  1. Preventive activities: As hackers are becoming creative to be successful in breaches to access data, service providers must have security protocols in place to stop potential risks before they actually happen. The cloud service providers should satisfy the client, for instance, by showing that they encrypt the data during its flight and at rest; monitor any risks 24/7; and inform the clients when security is a concern.
  1. Privacy of data: Data stored in the digital data centres should be treated with high degree of security, as they are important for the users. It is required to check how a service provider maintains the privacy of data. All types of materials such as files, folders, video conferencing data, and call recording data should remain safe and secure, with encryption technologies.
  1. Data loss protection:In case of a sudden data loss, the service provider should have an efficient data recovery system to quickly restore the data. Alert systems help in achieving an efficient data recovery.

Our Customers

  • ATOS
  • Age UK
  • Alliance Pharma
  • Liverpool Football Club
  • CSC
  • Centrica
  • Citizens Advice
  • City of London
  • Fujitsu
  • Government Offices
  • HCL
  • LK Bennett
  • Lambretta Clothing
  • Leicester City
  • Lloyds Register
  • Logica
  • Meadowvale
  • National Farmers Union
  • Network Rail
  • PKR

Sales question? Need support? Start a chat session with one of our experts!

For support, call the 24-hour hotline:

UK: 0800 999 3600
US: 800-220-7013

Or, if you've been given a screen sharing code:

Existing customer?

Click below to login to our secure enterprise Portal and view the real-time status of your data protection.

Login to Portal