Author: Jay

Why paying the ransom is a bad idea

Why paying the ransom is a bad idea: 1. There is no guarantee that you will be provided the decryption key or that all the data can be recovered. According to Sophos most victims are unable to recover some or all of their data: 92% of those who paid ransom lost some data, 50% lost […]

What is the gold standard for Ransomware protection?

Write Once Read Many (WORM) storage solutions are now back in fashion, thanks to ransomware. Historically, WORM storage has been used to meet regulatory compliance requirements for data immutability; which means the data cannot be modified or deleted. This was driven by SEC 17a-4, FINRA, and Sarbanes Oxley Act (SOX) regulations. There are over 10,000 […]

What’s in a name?

Historically we have used very specific names for software applications. For instance “Migration Software for Centera” (MSC) is the name of our migration application that copies data off Centera to another storage system. Later we added Atmos and Hitachi HCP as source systems we kept the name the same and it did lead to some […]

A Bridge to the Future

Organizations realize the strategic importance of data and consider it to be a valuable corporate asset that must be managed and protected just like any other asset. IT is chartered with the task of managing and protecting the data. To hold people accountable IT is structured in a demarcated manner around specialized functions. Each department […]

Why Business is Like Yacht Racing

There are many sporting analogies used for the complexities of running a business, my preference is yacht racing. Why is running a business like yacht racing? To me, it is an apt analogy because both are very challenging, require a strategy, need effective bi-directional communication, a skilled team, and the ability to read a changing […]

Looking Back

It is hard to believe that over a decade ago we started DataTrust Solutions with the mission to help organizations in regulated industries to modernize their data delivery by moving their data forward from proprietary legacy systems. At that time we were the only vendor using cryptographic hashes (digital fingerprints) to prove that the source […]