The holiday season is my favorite time of year, and like most of you, I take pictures of everything, everywhere— the Thanksgiving Turkey, all the holiday decorations, the family sitting around the dinner table, and more recently my daughter, who is celebrating her first holidays.  Each year is special to me and so are the memories.

However, I do remember one year taking some of my best holiday pictures with my phone only to discover it was missing later on Christmas day. Somehow my phone - and all the pictures on it - found its way into the toilet. I only discovered it because it didn’t get flushed down.

But, I lost all of those pictures. I was devastated.

Tips to Keep Your Holiday Memories Safe

Your company has a data protection solution and strategy in place. The product does its job and adequately protects your data and your systems. You sleep well at night.

Yet, one day you hear news that your software vendor is planning to spin-off its backup division, split up the company, or merge with another vendor?

Does the seemingly unrelated change in corporate structure affect your business?

The short answer is: Yes. The corporate ownership or structure of a software company most certainly affects its strategy and product lines – including investments in R&D, maintenance and customer support.

Where’s the new product release you promised me?

At the beginning of the year, Acronis put forward an aggressive plan to bring the most complete and easy-to-use data protection solutions to more businesses across the globe. We have made great progress, and this week announced a new and expanded strategic partnership with Ingram Micro as another step. This partnership greatly accelerates the momentum we have achieved to date. With Ingram Micro, we now have the backing and trust of a global powerhouse in IT services to aid our efforts.

Ingram Micro issued a press release on Monday that described many of the key points and information about the news – you can read it here. Below is a quick recap, which really highlights our mutual commitment to drive the adoption of complete data protection solutions and better serve our partners and end users:

If you’re supporting your company’s marketing and creative teams, you know that in order for them to keep up with the latest and greatest digital marketing techniques, they can no longer live without mobile applications and devices, which help improve productivity and real-time collaboration between employees and teams.   

The evolution of mobile devices - from smartphones to tablets to wearables – is one of the key factors rapidly pushing the marketing world to evolve in the way they do things.  Teams are dispersed and marketing & advertising agencies are virtually connected, with high levels of collaboration and ‘real-time’ versions of what’s being reviewed and worked on constantly moving between parties.

You only have to read recent news on cyber-threats and information falling into the hands of hackers or competitors to understand that it’s not a question of IF my company will get attacked, but when?  Adding to these data protection and privacy dilemmas, in Europe this past month there has been a lot of buzz about the dissolution of the Safe Harbor act by the European Court of Justice (ECJ), which impacts companies who relied on the act to conduct business safely and protect their data overseas.

It’s Time to Have That Talk – How to Explain Data Protection to Your Family!

It’s interesting to realize how much money and time we spend to protect our physical assets — our homes, furniture, cars and personal belongings. But many of us don’t invest in protection for our digital assets — photos, videos, important documents, contacts, and more.

For most of us, it’s difficult to reconcile these choices, especially given the fact that it is often impossible to replace your most high-value digital assets, such as photos and videos. Once you lose them, they are gone forever.

So why does it take a disaster for people to finally sta thinking about how to secure their digital assets in the same way that they take care of their physical ones?

It was a dark and stormy afternoon. IT administrator John was shaking, nervously traversing the dark corridors of his normally familiar office. He’s trembling in the sight of moving shadows, squeaking office doors and abnormally pale, almost ghoulish faces inside dark rooms of various company departments and offices.

He was in a rush to help Jane with her innocuous problem – “My PC does not work!” – that she just reported. To John, it sounded just like hundreds of other IT issues that he has resolved over his illustrious IT admin career.

But, Jane’s face was pale and she looked scared. And, that’s not even what really concerned John. It was the huge FBI logo on Jane’s PC screen, next to a timer counting down, and something about paying money that got John’s attention.

According to a recent Enterprise Strategy Group study, only 8% of organizations have virtualized the majority of servers that could be. Another study from Techaisle shows that only 60% of servers were virtualized in 2014, and while the figure is expected to rise, total virtualization is nowhere in sight. The same study also noted some of the major challenges of virtualization, including costs and management complexity.

Consumer public cloud file sync and share solutions are common today in corporate environments because they are easy for employees to get, easy to use, and enable access to content from any device and share it with colleagues and partners from any location. Sounds pretty good, right? Increase  productivity, ensure smoother employee collaboration,  and make a positive impact on the bottom line.

The problem is that these public cloud solutions often leave vast amounts of corporate data at risk to outside threats and beyond the reach of IT’s protection, management, and monitoring. In addition to losing highly confidential data and documents, this potentially can lead to violations of industry compliance or corporate governance regulations, and can result in reputation harm, and even financial loss.

What's at risk?

Perhaps you have been the victim of smartphone theft, and if not yet, you probably know someone who has had their digital life taken from them. With our lives constantly on-the-go, and the way we have integrated our smartphones into virtually all of our daily activity, our phones are always out and within arm’s reach of the next opportunistic thief.