Retrospect Blog

Retrospect, Inc. Turns 10

Retrospect inc 10

Retrospect, Inc. incorporated ten years ago today: November 1, 2011. Thanks to everyone who is or has been a part of Retrospect! It's a fantastic team, and we build a product that helps thousands of people recover from data loss.

Continue reading >>>

Mark It On Your Calendar: Verify Your Backup Day on Friday the 13th.

Blog verify backup day

As shared in Computer Weekly, “You are only as good as your last backup.” But what if that backup doesn’t work? Organizations must have copies of their data to serve as protection — like an insurance policy — against hardware failures, system outages, and other disruptions to the power or network, as well as flooding, fire, or other natural disasters. They also act as a safety net against application errors or accidental deletion.

Continue reading >>>

The Ever-Looming Threat of Ransomware

Blog ransomware

2020 was, without question, a banner year for ransomware attacks. Ransomware is a lot more prevalent than you think. When an organization is hit by a ransomware attack, they have two choices: Pay the ransom or lose — or even expose — their data. After the attack, these organizations are left to pick up the pieces and do damage control. In 2020, 51% of organizations were affected by ransomware.

Continue reading >>>

Tech Solutions that are Helping Organizations Thwart Cyberattacks

Blog cyberattacks

Hackers and cybercriminals nowadays are targeting more and more organizations. CNBC reports that cyberattacks cost companies $200,000 on average, while only 14% of small businesses have defense strategies currently in place.

Continue reading >>>

Top 4 Ransomware Attacks to Be Aware of Going Into 2021

Blog ransomware 2021

From malware distributing Facebook Ads and COVID-19 themed phishing emails, ransomware groups are the first to adapt their messaging to take advantage of uncertainty. And the ongoing pandemic, along with the massive changes to our everyday lives caused by it, have given these groups an ample amount of resources to exploit.

Continue reading >>>