Page 2,543«..1020..2,5422,5432,5442,545..2,5502,560..»

Veritas Simplifies Data Backup to the Cloud While Helping Reduce Costs and Increase Ransomware Resiliency – Business Wire

SANTA CLARA, Calif.--(BUSINESS WIRE)--Veritas Technologies, the leader in enterprise data protection, today announced Veritas NetBackup Recovery Vault, a simple, fully-managed storage as a service data repository for Veritas NetBackup. Generally available later this year, Recovery Vault will provide mission critical ransomware resiliency as a purpose-built, air-gapped storage tier for backups, while reducing the cost and complexity of using cloud storage from a selection of leading providers for long term retention and reliable recovery of backup data.

Backup data represents the last line of defense against ransomware, said Doug Matthews, vice president of product management at Veritas. Organizations need a simple, secure and cost-effective way to adopt cloud storage for long term data retention. It is absolutely imperative for enterprises to have the cloud repository Recovery Vault will provide, backed by the market leading solution they trust for their recovery needsNetBackup.

Simplified cloud storage with freedom of choice

Provisioning cloud-based storage with a self-managed public cloud service provider requires a series of cumbersome steps that can introduce security and compliance gaps.

Recovery Vault will simplify this process and reduce risks by providing a secure, familiar and unified interfaceNetBackupto both manage backup and recovery and easily provision cloud-based storage with freedom to choose from leading cloud storage providers. This affords customers the flexibility to automate provisioning of cloud storage among different providers on an application-by-application basis all within a single subscription.

Lowered total cost of ownership

Data growth is exceeding forecasts, and costs associated with data backup to the cloud can be difficult to predict. Recovery Vault helps control cloud storage costs by:

Increased ransomware resiliency

Because Recovery Vault facilitates separate, air-gapped cloud-based storage, it reduces the risk that ransomware and other threats to data integrity affecting primary data stores could compromise backups.

Recovery Vault cloud storage also benefits from NetBackups leading protection capabilities, including:

Traditional approaches to cloud data protection arent keeping pace with IT complexity, the evolving threat landscape or economic expectations, said Christophe Bertrand, senior analyst at Enterprise Strategy Group. Recovery Vault is designed to help enterprises be confident that their data is secured in the cloud from ransomware and other risks, plan for disaster recovery and meet compliance and governance requirementsall within the NetBackup platform to help improve operational efficiencies and costs.

To learn more, visit http://www.veritas.com/recoveryvault.

About Veritas

Veritas Technologies is the global leader in enterprise backup and data recovery solutions. Over 80,000 customersincluding 87 percent of the Fortune Global 500rely on us to abstract IT complexity and simplify data management. The Veritas Enterprise Data Services Platform automates the protection and orchestrates the recovery of data everywhere it lives, ensures 24/7 availability of business-critical applications, and provides enterprises with the insights they need to comply with evolving data regulations. With a reputation for reliability at scale and a deployment model to fit any need, the Veritas Enterprise Data Services Platform supports more than 800 different data sources, over 100 different operating systems, more than 1,400 storage targets, and more than 60 different cloud platforms. Learn more at http://www.veritas.com. Follow us on Twitter at @veritastechllc.

Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries.

Read the rest here:
Veritas Simplifies Data Backup to the Cloud While Helping Reduce Costs and Increase Ransomware Resiliency - Business Wire

Read More..

Storange Cloud Promotes the Worldwide IPFS Industry – The Kingston Whig-Standard

Article content

Hong Kong, China(Newsfile Corp. October 22, 2021) IPFS Harbor has initiated the new brand updating to Storange Cloud. It is reported that the brand upgrade includes three main sectors:

Storange Cloud launched IPFS storage product harbor lease. Besides that, it will also release the new business part, which aims to storage architecture establishment.

Storange Cloud

In addition to the globalization of business layout, Storange Cloud has also made significant progress in software & hardware; excellent hardware configuration and the stable network to ensure the operation safely and storage security. At present, their storage power distribution has been among the top in the world.

Storange Cloud has actively participated in the distributed storage ecosystem establishment since 2019. They have gone through the first and second mainnet test and space race, and won a rank of 23 in the world. At the same time, it maintains long-term close collaboration with the official Protocol Labs, has frequently contributed code, and repaired vulnerabilities to Filecoin Lotus.

IPFS decentralized storage industry and the data cloud storage industry have grown into a giant market; it will replace the traditional data storage production. Storange Cloud will catch the point and follow the generations needs to provide more convenient storage services.

Wendy Wan, CEO of Storange Cloud, said: Thanks to all our members effort so we have achieved such an excellent result and after the brand upgrade, Storange Cloud will look at the world, and the main business will cover Russia, Turkey, Japan, the United Kingdom, France, the Netherlands, South Korea etc. We will continue explore IPFS decentralized storage industry and data cloud storage production will be launched soon.

Contact: Charlie Choi +86 18202879346

To view the source version of this press release, please visit https://www.newsfilecorp.com/release/100566

#distro

Go here to see the original:
Storange Cloud Promotes the Worldwide IPFS Industry - The Kingston Whig-Standard

Read More..

The 7 Best monday.com Alternatives in 2021 [Paid & Free] – Cloudwards

monday.com leads our ranking of the best project management software, but its not meant for everybody. Whether you cant get along with its interface or just plain dont like it, there are plenty of reasons why youd want to try another project management tool instead. To get you started, weve put together these best monday.com alternatives.

Which one will be the right monday.com alternative for you of course depends very much on what you need it for, but hopefully our picks will get you on the right track. If not, you could check out our selection of the best project management software for small business for some other ideas.

Below youll find our list of the seven best alternatives to monday.com, more or less ranked by overall usefulness, with some exceptions.

All our picks are fully fledged project management tools that offer a wide array of features and functions. If youre looking for something a bit more modest in scale, we recommend you check out our best project management software for freelancers article instead.

monday.com has a free plan, but its not very good. It offers only the most basic functionality, and only for two users. Youre much better off checking out Asanas free plan.

Yes, but no: Trello is clearly trying to be more than just a kanban board, offering all kinds of fancy views on its paid plan. This may make it seem more like monday.com, but Trellos offerings are a lot weaker than monday.coms. At least, thats the case right now; it could very well change.

Of course, you may be wondering why youd even need a list of monday.com alternatives; after all, we recommend it in most of our roundups, so why would you need anything else?

In short, the answer is that monday.com is the best project management suite for most people, most of the time, but that does not make it perfect. As much as we like monday.com, we dont use it ourselves at Cloudwards: Trello meets our needs just fine.

Then what is so great about monday.com? Well, it boils down to a few factors: for one, we really like the project management features it offers. As we describe in our monday.com review, it has a solid package that should let any team, regardless of size, do what it needs to do.

On top of that, we also really like its interface. monday.com is colorful, but with a purpose: thanks to the riot of color it employs when you divide tasks, you can easily get your bearings and know what needs to be done and when. Its really good.

If you like your interfaces colorful, monday.com is a great project management tool.

monday.com also offers a decent, mid-range plan at $10 per user per month (if paying annually), meaning you get a solid set of features for a price thats smack-dab in the middle of the market.

Thats the good of monday.com in a nutshell. However, theres some bad too, mainly in the pricing. While we like the Standard plan a lot, the free and Basic plans are pretty bad. The free plan is a stripped-down joke of a plan thats barely a shadow of the best free project management software, while the Basic plan is ridiculously expensive for what it offers.

The plans on the upper end arent much better, and there are several other services that offer more for roughly the same amount of money. On top of that, monday.coms feature set is a little lacking in some areas. For one, the Gantt chart isnt very strong, and the kanban board could be a little better, too.

Even if you take that out of the equation, though, theres still the simple matter of taste. Maybe you just dont like how monday.com handles, or how it manages tasks or team members. Whatever the case may be, theres a solid alternative out there for you.

What weve tried to do in putting together our list is to make sure that one or more of monday.coms weaknesses are compensated for by each of our entries. Though that probably means youll get a different weakness in return, hopefully the trade-off will be worth it for your particular case.

Luckily, all our entries have either a trial or a free plan, so you can decide at leisure which is the best pick for you.

On our list, youll find a few options that have much of monday.coms functionality but presented differently, like Asana and Airtable, or options that are just a lot cheaper, like nTask and Bloo. We also have an option that could potentially be completely free (Freedcamp), or at least partially free, like Asana or Trello. Altogether, weve put together seven contenders.

With the preamble out of the way, lets go over our favorite monday.com alternatives, starting with Asana.

Asanas interface makes the same excellent use of color as monday.com

More details about Asana:

Pros:

Our top monday.com alternative is Asana, a great project management tool that loses out to monday.com by a hair in our general ranking. Asana is arguably even better in a few key areas, but as a general task management tool were a little more comfortable with monday.com. We go over the details in our Asana vs monday.com article.

When it comes to ease of use, Asana is comparable to monday.com for all the right reasons. As you can read in our Asana review, its workflow is built around the list, from which you can switch to a kanban view and a few others. Its a solid approach, and both monday.com and Asana apply it well.

What sets Asana apart, though, is that it has more advanced options. For one, it has a better Gantt chart (though its nowhere near as good as a dedicated tool read our TeamGantt review for one example). Other tools include a timeline, workload planning and more long-term planning options. As such, we recommend it over monday.com for large teams.

However, bigger and better tools come with a bigger price tag: As you can read in our article on Asanas pricing, its not cheap and all its plans are more expensive than comparable tiers with monday.com. However, its not all gloom: Asana also has a great free plan, making it a fantastic alternative to monday.com for teams of fewer than 15 people, as they wont have to pay a penny.

Premium

Business

Enterprise

nTask doesnt look as pretty, but makes up for it in other ways.

More details about nTask:

Pros:

Cons:

Our second pick is nTask, which isnt quite as useful as either monday.com or Asana, but makes up for it in price. Its by far the cheapest option out there, with the exception of Bloo and Freedcamp. At under $3 per user per month, you cant beat nTask for price, especially considering your first three team members will only set you back a single buck per month each.

However, nTasks overall feature set falls a little short when compared to the big boys. While it has everything you need to run most projects, a lot of the quality-of-life tweaks that monday.com offers are missing.

At the same time, though, it also offers options you wont find with most competitors, like a meeting planner and a note-taking tool (though its no match for our best note-taking apps).

Still, at the prices nTask offers, youll forgive it a lot. We break it down in our nTask review, but its cost per team member cant be beaten by anybody, not even a budget option like Bloo. On top of that, it has a pretty solid free plan for up to five users, meaning small teams can use this great project management tool without spending a penny.

Free

Premium

Business

Enterprise

For a new kid on the block, Bloo looks pretty good.

More details about Bloo:

Pros:

Cons:

Our third entry is Bloo, a relative newcomer that we were very impressed with when writing up our Bloo review. Its biggest gimmick is that it offers a flat price of either $50 per month or $500 per year regardless of how large your team is, which is pretty rare among project management software and its per-user rates.

Its not a great deal for small teams: We figure most project managers charge about $10 for their standard plans. That means you need at least five team members to make Bloo worth it, or even as many as 15 to 20 if you use nTask as your benchmark. Freelancers and tiny teams best steer clear of Bloo, unless you really like spending money.

That reservation aside, Bloo offers a lot for its low cost. While its clearly still a work in progress in some parts, everything you need to keep track of tasks and run projects is here. Though its light on the bells and whistles of other services, people who like their software straightforward will love Bloo.

It also comes with some fairly unique team management and social functions that will help facilitate communication among your team, though we have a feeling it wont supplant communication tools like Slack or Basecamp (read our Basecamp review). Overall, we really like Bloo and we recommend that anybody who likes cheap software give its 14-day trial a spin.

Bloo

Wrike looks a little bleak, but it gets the job done.

More details about Wrike:

Pros:

Cons:

In fourth place we find Wrike, a powerful piece of project management software with some serious old-school vibes. As we describe in our Wrike review, this is both good and bad: the good is that its file structure and navigation come with some old-fashioned simplicity. The bad is that it picks function over form, so it doesnt look all that great.

Still, though, theres a lot more good than bad here: Wrike is a very solid tool, and we like how well it scales. You could run a small company with it, a large corporation or anything in between. Its boards, lists, sheets and everything else will grow with your company. It also has better Gantt charts than monday.com does, as we discuss in our Wrike vs monday.com article.

However, what really sets Wrike apart from all our other entries on this list are its excellent reports. Wrike can produce more data, and with more criteria, than most other project management software, and makes it look easy too. If you have a lot to keep track of, Wrike definitely deserves a close look.

When it comes to Wrikes pricing, its fairly middle of the road at only a few cents cheaper than monday.com on the mid-range plan. However, it has a far better free version than monday.com does. Though the features are a bit basic, it allows for up to five users, which is pretty decent. Overall, Wrike is a solid choice for any company, big or small.

Free

Professional

Business

Enterprise

Trello has one of the best interfaces weve seen.

More details about Trello:

Pros:

Cons:

In fifth place we find the best kanban app on the market, Trello. We use it ourselves at Cloudwards, and if youre planning to run all your operations using only kanban project management, this is definitely the option for you. Its very easy to use and the free version might very well be enough for you.

If you need more than just a kanban board, though, the choice between monday.com vs Trello is easily made, as monday.com has a much better, more complete tool set. At least it did until late 2020, when Trello got a massive upgrade that gave it a large number of new views and features that put it on par with full suites like monday.com or for that matter, Asana.

As we describe in our Trello review, the new additions are pretty solid, and take Trello away from its former reliance on third-party integrations. On top of the board, users can also create tasks in a list, a timeline and a calendar. It all works pretty well, though the kanban aspect still steals the show.

As for Trello pricing, its about the same as monday.coms, meaning theres no financial reason not to make the jump from monday.com to Trello. If your project management strategy relies heavily on kanban boards, Trello should definitely be on your list to take for a spin.

Free

Trello Gold

Business Class

Enterprise

Freedcamp has a great dashboard for project tracking.

More details about Freedcamp:

Pros:

Cons:

In sixth place we find Freedcamp, an interesting project management tool because it offers very cheap plans, as well as unlimited users on the free plan. Its an odd combination, as it sort of dissuades people from signing on, but it makes Freedcamp a great pick for large teams with low project management needs.

As we talk about in our Freedcamp review, this is because it can do a lot, even in the free version and the lower tier paid plans. We especially like the calendar and how it works with the kanban board. Its also very user-friendly and comes with a great dashboard that lets you keep track of multiple projects, recurring tasks whatever you want, all at a single glance.

For some reason, though, the first upgrade after the free version only gets you some integration with cloud storage services and a few other less useful doodads, so were not sure what youre paying for here. The Business plan and Enterprise plan have a lot more to offer, but also cost a lot more.

Whether or not the upgrade is worth it is something individual businesses will have to decide, but overall we like Freedcamp enough to recommend that anybody with a large team and a small wallet give it a whirl.

Free

Pro

Business

Enterprise

If you like your learning curves flat, Airtable is a great pick.

More details about Airtable:

Pros:

Cons:

We finish up our list with Airtable, another solid project management tool that lets you do a lot for free. In fact, we praise it in our Airtable review for the fact that it offers an almost complete suite of features for free, limiting only how much you can use it. Though you will hit the ceiling pretty quickly, it still makes Airtable a great pick for small teams.

The basis for Airtable is the spreadsheet, which is a pretty old-school way of handling things. Unlike Wrike, though, it actually has upgraded its look a lot. This means its only old-fashioned behind the scenes, which is nice. In fact, we like Airtable a lot for how it shows you the ropes, definitely making it a top pick for anybody unfamiliar with project management.

However, if you dig a little deeper, you quickly run into Airtables limits. A lot of advanced features are locked into the more expensive plans, and even those tiers feel like they could do with some filling out. Its no Asana, thats for sure.

This is made even more glaring by its pricing. Airtable charges industry-standard rates, but offers a lot less. As such, we can only recommend its free plan; should you need to upgrade, there are better options out there.

Free

Plus

Pro

If youre looking for an alternative to monday.com, there are plenty of options to choose from. Though our overall favorite is Asana, thanks to its usefulness and some great extras, our other six picks have plenty to recommend them. From the cheap plans of Bloo and nTask to the great reports of Wrike, theres something here for everybody.

What are your experiences with monday.com? Will you stick with it or try out one of our alternatives? Did we miss a particularly good option that youve been using? Let us know in the comments below and, as always, thank you for reading.

Let us know if you liked the post. Thats the only way we can improve.

See the original post here:
The 7 Best monday.com Alternatives in 2021 [Paid & Free] - Cloudwards

Read More..

WhatsApp Chat Backup: How to Backup WhatsApp Messages on Android Mobile and iPhone – MySmartPrice

WhatsApp is one of the most-used applications when it comes to communicating with friends, family, office colleagues, and more. The messaging application is also widely used to convey formal messages to your clients, boss, and more. So, it is important of utter importance that you keep all the chats, photos, videos, and more backed up just in case of an emergency. Thankfully, WhatsApp allows you to easily back up all your messages, photos, documents, and more on cloud storage. One can easily backup WhatsApp chats on Google Drive and iCloud storage. In this article, we are going to tell you how to backup your WhatsApp chat on Android and iPhone by following some simple steps. So, without wasting your time, lets begin.

Also Read: Dual WhatsApp: How to Use Two WhatsApp Accounts in One Mobile Phone

WhatsApp allows you to backup all your chats, messages, videos, documents, and more on Android devices. All you need to do is have some free storage on your Google Drive and the rest of the things will be taken care by the application itself. Heres what you need to do to backup WhatsApp chats on your Android smartphone:

With this, you will be able to back up your data on your Android smartphone with ease.

Also Read: WhatsApp Multi-Device Support: How to Use WhatsApp on Multiple Devices (iOS, Android Mobiles)

WhatsApp also allows you to backup your WhatsApp messages to cloud storage. However, in this case, it will be stored in iCloud and not on Google Drive. Heres how you can do it:

Moreover, you can also enable automatic updates by simply clicking on the Auto Backup and then login into your iCloud account. You also have an option to upload videos or not from this menu.

Also Read: WhatsApp Web Video Call: How to Make Video Calls Using WhatsApp Web on Windows PC and Mac

If you dont want to backup all your chats or messages on Google Drive, WhatsApp gives you an option to Export particular chats from the application. Heres how you can do it:

Also Read: WhatsApp Profile Picture: How to Set Profile Photo on WhatsApp, Hide It from Particular Contact, and More

You can also export WhatsApp chat from your iPhone. Heres how you can do it:

Also Read: WhatsApp: How to See Deleted Messages on WhatsApp?

If you are thinking that WhatsApp backup will eat up your Google Drive cloud storage, then you need not worry. This is because WhatsApp has clearly mentioned that the WhatsApp chat backup does not take any space on Google Drive. However, it is important to note that media and messages you back up on Google Drive are not protected by WhatsApps end-to-end encryption.

Well, there is no direct way to see all the data that is backed up on Google Drive from WhatsApp. This is primarily because the data is end-to-end encrypted, meaning that you will not be able to read it on your PC or using any other third-party application. The only way to access the WhatsApp backup is by restoring the same on your WhatsApp account. That said, you can see how much space WhatsApp backup has taken on your Google Drive. Heres how:

With this, you will be able to see all the storage WhatsApp has taken on Google Drive.

Also Read: WhatsApp Font Styles: How to Send Italic, Bold, Strikethrough, or Monospaced Text Messages on WhatsApp Web and mobile?

No, you cant transfer the WhatsApp backup from iCloud to Google Drive directly. This is because the WhatsApp backup is stored with different encryptions on iCloud and Google Drive, which makes it quite impossible to transfer between two cloud storage services.

Also Read: WhatsApp Online Status: How to Hide Last Seen Online Status on WhatsApp Web and Mobile App

As per WhatsApp, if you havent updated your WhatsApp backup data in more than one year then all the backups will be automatically removed from Google Drive. Moreover, every time you create a Google Drive backup using the same Google account, the previous backup with be overwritten and there is no way to restore an older Drive backup.

Thanks for reading till the end of this article. For more such informative and exclusive tech content, like our Facebook page

Link:
WhatsApp Chat Backup: How to Backup WhatsApp Messages on Android Mobile and iPhone - MySmartPrice

Read More..

IBM has flat revenue third quarter with a bright spot in gasp storage Blocks and Files – Blocks and Files

Revenues in IBMs third fiscal 2021 quarter, ended September 30, were $17.6 billion up 0.3 per cent year-on-year. There was a profit of $1.1 billion 33.5 per cent lower than a year ago but storage revenues rose 11 per cent annually.

The revenues were effectively flat and profit was down not a lot to write home about. SVP and CFO James Kavanaughs results statement emphasised the positives and said: We again had solid cash generation for the quarter and over the last year, while maintaining a strong balance sheet and the liquidity to support our hybrid cloud and AI strategy.

IBMs Chairman and CEO Arvind Krishnas results statement ignored the headline numbers and looked ahead: With the separation of Kyndryl early next month, IBM takes the next step in our evolution as a platform-centric hybrid cloud and AI company. We continue to make progress in our software and consulting businesses, which represent our higher growth opportunities. With our increased focus and agility to better serve clients, we are confident in achieving our medium-term objectives of mid-single digit revenue growth and strong free cash flow generation.

Kyndryl is the name of the to-be-separated-out IT Infrastructure Services unit of IBMs Global Technology Services business unit, and will become an independent company next month. The corporation reckons it will exit this fiscal year able to deliver mid-single-digit revenue growth and $35 billion free cash flow in 20222024.

IBMs business segment results:

The Systems segment revenue decline was driven by declines in Z mainframes (down 33per cent) and Power systems (down 24 per cent). Storage Systems grew 11 per cent. Cloud revenue was down 42 per cent. The growth in storage was driven by entry-level and tape systems.

IBM launched an entry-level FlashSystem 5200 in February faster and higher in capacity, yet 20 per cent lower in price than the prior 5100 and it has obviously done well. The growth in archival data storage needs has probably accounted for the tape systems revenue increase.

The mainframe and Power revenue declines were attributed to cycle dynamics, implying a revenue uplift should hopefully be coming from new hardware and software.

Systems provided $0.8 billion in hardware revenues and $0.3 billion in operating systems software revenues. IBM has provided percentage change numbers for the storage part of its systems business, and our records anchor these to an actual storage revenue number provided many quarters ago. We have recalculated the quarterly storage revenue number using these percentage changes and expect we are progressively becoming less accurate as a result.

This proviso is spelled out before we include our chart of IBMs quarterly storage revenues by fiscal year to show the historical trends:

One quarters growth after many declining quarters does not make a trend, but IBM can be hopeful that a corner may have been turned.

We must note that most of IBMs storage software revenues are not included in the Systems storage segment number. IBM is odd in that it does not provide a central and all-inclusive storage revenue number at least in its public numbers. We simply do not know how IBM is doing from a storage software revenue perspective.

Read this article:
IBM has flat revenue third quarter with a bright spot in gasp storage Blocks and Files - Blocks and Files

Read More..

WhatsApp chats leaking so Bollywood superstars are trying to get phones wiped, but is it possible? – India Today

The ongoing Mumbai Drug Case involving Bollywood superstar Shah Rukh Khan's son Aryan Khan and actress Ananya Pandey has once again put WhatsApp into the limelight. WhatsApp chats between these celebrities are seemingly dictating the direction of the ongoing investigation. Deja vu? This has slowly become a norm. It's surprising too, given that WhatsApp claims that the platform is entirely end-to-end encrypted and messages or media exchanged on it, cannot be accessed by anyone.

Yet, the entire Bollywood industry was shaken last year when the NCB got access to Rhea Chakraborty's WhatsApp messages. Now, India Today TV has learnt that NCB has recovered chat messages of a conversation between Ananya Panday and Aryan Khan. The sources also tell that this has put many Bollywood superstars on an alert. Whether they have something to hide or not, many are now trying to get their phones wiped in a bid to erase messages, photos and other data that can possibly lead to violation of their privacy.

Is it possible though? Can a user actually get rid of all the data on your smartphone without leaving a trace? It's more complicated than what it may appear to be. We will try to explain.

There are different ways through which you can delete the data on your phone cleaning the physical storage, doing a factory rest of the device and erasing everything from cloud or backup drives. In each case, the phone reacts differently and there might be times when some data is left behind. Let's go through each of these methods one by one.

Cleaning physical storage: Any device (smartphone, tablet or laptop) stores data in two places physical storage and cloud. The first is commonly known as the onboard or internal storage. The pictures, videos and documents you see on your phone are stored on phone's physical storage. When you delete them, they are not instantly removed. Instead, they are "marked for deletion."

And this "marked for deletion" happens in two ways.

One, tech companies don't like when you delete data. So instead of deleting something right away, they put it in "bin" or "trash". For example, on an Android phone, when you delete a photo it goes into bin. You can go to bin and can retrieve it if you have changed your mind about deleting that photo. All these media files remain in Bin on your device for the next 30 days before they are completely removed. Or after deleting a photo or video, you can directly go to "bin" or "trash" and delete the files manually and immediately.

This means that even the deleted files can be accessed for a month unless they are also removed from the 'Recently Deleted' folder. The same also applies to your emails. Most email services, including Gmail store your deleted emails for a month before completely trashing them. It is done to provide users an option to recover the deleted files.

The second "marked for deletion" happens after a file has been completely deleted. Although, there are different ways different smartphones and laptops handle this. Traditionally, all storage systems whether they use a hard drive or a card storage or something else work by creating writable and non-writable sectors. So, when you have a photo in your phone, the sector this photo is using is deemed non-writable by the operating system. When you delete the photo, the sector suddenly become writable. However, the data is not overwritten until there is fresh data in the photo, such as you clicking some more photos.

What this effectively means is: Even if a user has deleted a photo, video or some other data completely, it can be retrieved by forensic tool. The only way to be sure that data is all gone are two: In non-extreme case this would be not just deleting the data but deleting it securely by overwriting the storage with rubbish. There are a number of programs that do it. Or the other option is: just burn the thing if you are extremely paranoid about your privacy. That is what Edward Snowden would do,

One more important bit to note is the cloud factor. Phones use cloud storage. These include Google Drive, iCloud, OneDrive etc. If you have a backup on any of these services, the files deleted from phone can still be accessed through cloud. How to deal with this? We will get to it later.

This is a good way to get rid of phone data or at least the companies claim so. In simple words, the factor reset option sends your device into the condition it came out of the factory. This means everything on the device including photos, images, apps and data is gone forever. Once you factory reset the phone, it will reboot and begin with the usual opening questions, such as language, account, network, etc.

The smartphone makers claim that any data removed through factory rest cannot be recovered. It's true, at least in case of users. You cannot see that data on your phone or access it. But, there is no way to find out if this data cannot be accessed by the smartphone makers too. Also, even if they share this with the government agencies, the users will never get to know.

Also, a lot depends on what a company means by factory resetting. These things are not told to users. We don't know what sort of logs are created when a phone is reset. Or what sort of data a phone company choose to save or delete, and in what way when the factory reset command is given.

In other words, even when a phone has been factory reset, do consider the possibility that forensics can get a lot of private data from it.

One thing that you again need to know is that the data on cloud is not removed even when your factory rest your device. Whenever you will log in to a new smartphone and use the same cloud service, this data will be back. And, at this point, we should address this cloud storage problem.

A lot of our data these days is also stored in cloud services. Blame it on the lack of limited physical storage if you want to or our urge to capture everything we see. I have already mentioned some of these popular storage services on top. In both the methods we have mentioned above, the data on cloud is still not erased.

To get rid of it, you need to manually erase everything from the cloud service you are using, disable the backup option and also sign out from the service. Again, some of these cloud services store the deleted files for a few days to give users an option to restore them. For example, Apple says 'iCloud backups are available for 180 days after you disable or stop using iCloud Backup'. So, you will also have to delete these files from the 'Recently Deleted' folder to completely erase them.

By now you should know that wiping your phones is not as easy as it sounds. And even if you are able to follow all the processes we have mentioned, there is no guarantee that the smartphone makers are not storing your data at their end, even though they promise to. Also, there are certain recovery methods which may not be able to provide the deleted files but, give some insights how the information was stored on the device.

The learning for Bollywood, or anyone concerned about privacy, here is that it's not easy to get rid of anything that has once appeared on your smartphone in this digital world be it messages, images, location history or anything else. So, the so called superstars need to be a little more careful about their privacy.

Follow this link:
WhatsApp chats leaking so Bollywood superstars are trying to get phones wiped, but is it possible? - India Today

Read More..

What is Norton Family and what does it do? – TechRadar

Norton Family is a parental control suite from the respected antivirus vendor, which covers PCs and mobiles. Its an in-depth product that seeks to ensure that your kids stay safe online.

But how does it do that, and exactly what features are included?

In this article, were going to provide a breakdown of the functionality included with Norton Family and what devices it supports, before discussing how good this suite is for parental control duties.

Today's best Norton Family and Norton 360 Deluxe deals

Norton Family is a parental control suite that is designed to keep your children safe when theyre online or offline for that matter (more on that later). It rather niftily provides protection for all your kids, no matter how many, with unlimited devices covered.

The kind of features offered here include monitoring to see what your offspring is up to online, the ability to restrict device usage to certain times, and of course defenses to keep kids from stumbling onto any nastiness while browsing the web.

Note that you also get this parental control package if you buy the more advanced security suites from this firm, namely Norton 360 Deluxe or Norton 360 Premium (in these suites its called Parental Control rather than Norton Family, but its the same thing).

Norton Family can be installed on unlimited devices, and supports not just Windows PCs, but also Android and iOS devices (the only thing you dont get here is support for Macs, basically). Windows 10 (but not Windows 10 S Mode) and Windows 8 are supported but not the Edge browser and on mobile, you need to be running Android 6.0 or better, or if you have an Apple device, iOS 13 or newer.

Want to know what this suite is capable of? Lets look at some of the highlights of Norton Familys feature set. Note that some abilities are only available on certain platforms so app blocking, for instance, is just on Android and well flag this up wherever this is the case.

Web Supervision

A core element of any piece of parental control software, this lets you see where your kids are browsing on the web, and facilitates the blocking of inappropriate sites. Its possible to block content over a whole host of diverse categories (not just the usual options relating to pornography, drugs and so forth).

Time Supervision

As the name suggests, this allows for setting time limits and managing when your kids can use their devices, blocking them off at bedtime or maybe meal times (or you can use Instant Lock to temporarily, but instantly, block a device).

School Time

With home schooling perhaps still on your mind following lockdowns in some countries, this feature helps to manage remote learning on the childs device, keeping them focused on work and not allowing any distractions by limiting web access strictly to educational content (which could be useful for homework time, too).

Search Supervision

This lets you monitor your childs web searching activities to see if theyre looking for anything inappropriate. It also implements Nortons Safe Search to filter out unsuitable search results. Furthermore, videos watched at YouTube are monitored and you can see a thumbnail and description to quickly let you judge whether a viewed clip might be anything potentially dodgy.

Mobile App Supervision

With this feature you can see what apps your kids have downloaded, and block any that you feel are unsuitable. Note, however, this this is for Android devices only, so iOS users are left out here (that said, this isnt Nortons fault, as the reason is wrapped up in the way Apple implements its mobile OS with tight security measures).

Location Supervision

For parents worried about where their child might be not when online, but in the real world instead, Norton Family offers a full system of location tracking (and a 30-day history of where theyve been) for both Android and iOS mobiles. Alert Me is a further feature tied in with this which delivers automatic alerts when a child reaches certain defined locations (school, home and so forth), with impressively in-depth options and controls for these functions.

Monthly/Weekly Reports

Some equally in-depth reports are provided on everything your kids have done, and these can be accessed from a well-organized web portal.

Norton has a good reputation within the security world and the Norton antivirus engine is consistently ranked highly by the independent test labs. That, of course, isnt strictly relevant to the Norton Family product itself, but the pedigree of the developer is always a consideration and this is a quality parental control suite which blends power and convenience with some great filtering and location controls - our Norton Family review goes into more detail.

The asking price for Norton Family is more than reasonable given that it delivers support for an unlimited amount of devices, so no matter how big your family and how much kit is owned therein youll be covered with one subscription.

Thats an impressive value proposition, but the other consideration is whether you might want to plump for Norton 360 Deluxe instead, which includes the Parental Control module.

Now, Norton 360 Deluxe is a bit more expensive if you go by the recommended asking prices, but the internet security suite is invariably heavily discounted, and after price-cutting is generally only a little more expensive than Norton Family (if not the same price, at times). The trade-off is that only five devices are supported by Norton 360 Deluxe, but if thats all you need, then you get a fully-fledged security suite with a whole host of extra features for not a lot more money.

Its worth thinking about, certainly, but the bottom line is both these products offer good value, and feature-wise they compare favorably to rivals very favorably in the case of Norton Family.

Get the best price on your preferred Norton package

Go here to read the rest:
What is Norton Family and what does it do? - TechRadar

Read More..

Cyberattacks to critical infrastructure threaten our safety and well-being – The Conversation CA

What would happen if you could no longer use the technological systems that you rely on every day? Im not talking about your smart phone or laptop computer, but all those systems many of us often take for granted and dont think about.

What if you could not turn on the lights or power your refrigerator? What if you could not get through to emergency services when you dial 911? What if you could not access your bank account, get safe drinking water or even flush your toilet?

According to Canadas National Strategy for Critical Infrastructure, critical infrastructure refers to the processes, systems, facilities, technologies, networks, assets and services essential to the health, safety, security or economic well-being of the public and the effective functioning of government.

Disruptions to these kinds of systems, especially those caused by cyberattacks, can have devastating consequences. Thats why these systems are called critical infrastructure.

Over the past six months, the fragility of critical infrastructure has been given plenty of attention. This has been driven by a string of notable cyberattacks on several critical infrastructure sectors.

It was revealed that in late March 2021, CNA Financial Corp., one of the largest insurance companies in the United States was victim to a ransomware attack. As a result, the company faced disruptions of their systems and networks.

In May 2021, a ransomware attack on Colonial Pipeline halted plant operations for six days. The attack led to a fuel crisis and increased prices in the eastern U.S.

Weeks later, in June 2021, a ransomware attack hit JBS USA Holdings, Inc., one of the worlds largest meat producers. This attack brought about supply chain turmoil in Canada, the U.S. and Australia.

Also in June 2021, the Marthas Vineyard and Nantucket Steamship Authority was victim of a ransomware attack that disrupted ferry services and caused service delays.

On Oct. 14, 2021, hot on the heels of cyberattacks targeting the financial, gas, food and transportation sectors, the U.S. Cybersecurity and Infrastructure Security Agency released Alert AA21-287.

The alert turns attention to the fragility of yet another critical infrastructure sector. It warns of ongoing malicious cyberactivity targeting water and wastewater facilities. These activities include exploits of internet-connected services and outdated operating systems and software, as well as spear phishing and ransomware attacks something we have seen a lot in recent cyberattacks.

According to the alert, these cyberthreats could impact the ability of water and wastewater facilities to provide clean, potable water to, and effectively manage the wastewater of, their communities.

The need for combating cyberthreats to critical infrastructure is well recognized. However, the infrastructure today is far from secure. This is due to a many interrelated factors that create a perfect storm of exposures.

First, many of our most critical systems are extremely complex. This complexity is rapidly increasing as the number of devices and connections in these systems continues to grow.

Second, many of these systems involve a mix of insecure, outdated legacy systems and new technologies. These new technologies promise features like advanced analytics and automation. However, they are sometimes connected and used in insecure ways that the original designers of the legacy systems could not have imagined.

Taken together, these factors mean that these systems are too complex to be completely understood by a person, a team of people or even a computer model. This makes it very difficult to identify weak spots that if exploited accidentally or intentionally could lead to system failures.

In the Cyber Security Evaluation and Assurance (CyberSEA) Research Lab at Carleton University, we are developing solutions to address the fragility of critical infrastructure. The goal is to improve security and resilience of these important systems.

The complexities of critical infrastructure can lead to unexpected or unplanned interactions among system components, known as implicit interactions.

Exploitation of implicit interactions has the potential to impact the safety, security and reliability of a system and its operations. For example, implicit interactions can enable system components to interact in unintended and often undesirable ways. This leads to unpredictable system behaviours that can allow attackers to damage or disrupt the system and its operations.

We recently conducted a cybersecurity analysis at CyberSEA on a real-world municipal wastewater treatment system, where we identified and measured characteristics of implicit interactions in the system. This was part of our ongoing research, conducted in partnership with the Critical Infrastructure Resilience Institute at the University of Illinois at Urbana-Champaign.

Our analysis found a significant proportion of implicit interactions present in the system, and approximately 28 per cent of these identified vulnerabilities showed signs of being ripe for attackers to exploit and cause damage or disruption in the system.

Our study showed that implicit interactions exist in real-world critical infrastructure systems. Feedback from the operators of the wastewater system in our case study stated that our approaches and tools are useful for identifying potential security issues and informing mitigation efforts when designing critical systems.

This may be a glimmer of hope in the fight against cyberthreats to critical infrastructure. Continued development of rigorous and practical approaches to address increasingly critical issues in designing, implementing, evaluating and assuring the safe, secure and reliable operation of these systems is needed.

A more robust infrastructure will lead to fewer threats to our security and access to services, ensuring our well-being and the effective functioning of our governments and society.

More:
Cyberattacks to critical infrastructure threaten our safety and well-being - The Conversation CA

Read More..

Cybersecurity Awareness Month: Soon-to-be grad loves the ‘whole picture’ of cyber operations – Jagwire Augusta

Justin Henry, a senior pursuing a Bachelor of Science in Cyber Operations in the School of Computer and Cyber Sciences, loves looking at the big picture when it comes to cybersecurity.

Henry, an Augusta native, enrolled at Augusta University in 2018, following his service in the U.S. Marine Corps. He was first intrigued by the field of cyber operations, thanks to his fellow Marines showing him the ropes of what they did during their service.

While Augusta University didnt have a cyber operations program when he initially enrolled since it wasnt created until 2019, Henry started his time at Augusta University as a computer science major.

With my security background, Ive definitely been interested in the whole picture, he said.

To Henry, cyber operations is the best of both worlds of computer science and cybersecurity. Contrary to popular belief, computer science and cybersecurity are two different disciplines. The cyber operations degree program blends both disciplines into one program. Thats what Henry loves the most about it.

With computer science, the focus is what can I make a computer do? When it comes to cybersecurity, the focus is what can I make a network do? said Henry. Cyber operations is a perfect blend of both disciplines.

October is Cybersecurity Awareness Month, and the theme this year is Do Your Part. #BeCyberSmart. The 2021 theme is meant to empower individuals and organizations to own their role in protecting their part of cyberspace.

To be cyber smart this month and beyond Henry advises to never assume a website youre on is safe. Always approach a website with a bit of skepticism.

Back in 2004, the National Cyber Security Alliance and the U.S. Department of Homeland Security launched National Cybersecurity Awareness Month in an effort to help all Americans become more secure online.

As we get more and more connected to the internet, this field is only going to become more relevant, Henry said. Its not going away at all, probably ever.

Henry is working with Dr. Hoda Maleki on a medical information research project this semester. The researchers are analyzing how to facilitate the sharing of medical information with providers who need it, while simultaneously coming up with a way to identify if there is a breach in the system. Maleki said she appreciates how Henry fully invests himself into his work.

Justin consistently meets and often exceeds my expectations for him, said Maleki. He invests himself in the work, which resulted in significant progress on our research.

In his spare time outside of school, Henry loves to spend time with his family.

While Henry has put his name out there for some job opportunities, he said life post-graduation is likely going to include going back to school. Down the road, he is interested in a masters program, if not a doctorate as well likely at Augusta University.

LikeLoveHahaWowSadAngry

11

See the original post here:
Cybersecurity Awareness Month: Soon-to-be grad loves the 'whole picture' of cyber operations - Jagwire Augusta

Read More..

List: The 10 most invasive sites on the internet – Komando

We all know that our online browsing habits are being tracked. Unless you take steps to prevent it, most websites see where you come from, what you are searching for and what you like. Tap or click here for 8 hidden maps and trackers you need to switch off.

All this data is valuable to sites and services, as they use it to serve targeted advertising. Ever searched for something on Amazon and then seen an ad for a similar product on Facebook? That is targeted advertising at work.

Thankfully, not all websites treat you as a treasure trove of information. You might be pleasantly surprised to find out which sites have the least amount of trackers. But on the other end of the spectrum, the biggest culprits shamefully stuff their sites with hundreds of trackers.

There are plenty of ways for a website to track you. Some might be subtle, like an invisible pixel or cookies, while others access your devices GPS to locate you on the globe. But who are the biggest offenders?

VPN provider SurfShark launched an investigation to find out, and some of the results are somewhat surprising. Its findings revealed that some of the most commonly-used websites hide up to 100 trackers, all designed to collect as much information on you as possible.

Learn the tech tips and tricks only the pros know.

SurfShark analyzed a typical browsing session over the course of a weekend and noted which trackers were activated, who the trackers belonged to and where the information goes once collected.

Heres the good news. Websites with the least amount of trackers:

SurfShark explained: Wikipedias privacy summary notes that that some of these [tracking] technologies do not have the best reputation in town and can be used for less-than-noble purposes and that the company uses automatically-received data to administer the sites, provide greater security, and fight vandalism.

SurfShark found 143 trackers on the most invasive website, 92 of which are used for advertising purposes. Tracker counts also vary by category, with Mens & Womens Lifestyle websites having the most trackers (59) on average than other categories.

The most invasive sites are:

If you dont want websites or services to track you, there are ways to stop them. Here are some suggestions:

Privacy warning: Researchers find location trackers in 450 apps

X

Learn the tech tips and tricks only the pros know.

Hidden iPhone trackers harvest data while you sleep

Read the rest here:
List: The 10 most invasive sites on the internet - Komando

Read More..