Cloud storage continues to grab the headlines with all manner of head turning statistics, but this doesn’t mean that offline storage is now redundant.

Ease of access, scalability and high levels of security are just three of the many reasons why cloud storage has become the go to solution for data storage. As a result, in many people’s eyes, offline storage appears clunky and outdated in comparison. However, offline storage solutions – no matter how old fashioned – remain relevant to businesses in 2023. It’s simply a case of understanding why you should implement them into your storage schedules and the best ways to achieve this.

What is Offline Storage?

In its simplest terms, offline storage is data which is not connected to your network or accessible by the internet. Cloud storage solutions – including mainstream services such as Google Drive – all require one key element to grant access to their users: an internet connection. Therefore, a storage solution which isn’t accessible by the internet is classed as offline storage. Examples of offline storage options include:

  • External hard drives
  • USB flash drives
  • Optical media such as Blu-Ray and DVD
  • Magnetic tapes (still in use, but less popular compared to more modern solutions)

Why Do You Still Need Offline Storage?

The wonders of cloud storage may be cutting edge and deal with an old problem in a new way, but offline storage remains crucial for the following reasons:

  • Multiple backups are critical: relying on a single data storage solution is a recipe for disaster. Say, for example, your cloud storage provider is hacked and all your data is encrypted or, worse yet, wiped from the servers, this is going to cause you major continuity issues if this is your only backup. However, with offline storage options in the background, you are significantly reducing the risk of your productivity dropping to zero. The 3-2-1 backup method is the best approach to adopt and could save your organization.

Final Thoughts

Cloud storage is clearly an exciting and effective option when it comes to data storage in 2023, but it should not be considered the only option. Instead, it’s vital that businesses understand that a multiple backup approach, which utilizes both online and offline storage, is the surest way to keep data safe.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


It may sound like a backwards step, but a group of cyber criminals have decided to enlist the help of the postal service to deliver their malware.

Snail mail may feel like an archaic method of attack for cyber criminals, but it’s surprisingly effective as a series of attacks – using the BadUSB malware – have proven. We all deal with traditional mail daily, so it’s easy to take it for granted, and it’s this familiarity that the hackers are targeting. This particular attack, as the name suggests, involves a malicious USB drive. These attacks have proved successful in the past and the BadUSB campaign has the potential to cause significant damage.

How Does BadUSB Work?

Delivered through the United Parcel Service and United States Postal Service, the malicious USB drives come loaded with malware and allow a threat actor to take control of a victim’s USB port. Activating the malware is simple: all it needs is to be plugged into a USB port.

However, there needs to be a reason why a victim decides to plug the device into their PC. And the minds behind BadUSB do this by instilling a sense of urgency in the recipient. This is achieved by claiming that the USB drive contains official Covid-19 warnings or that the drive is an Amazon gift from a friend.

Once plugged into a PC, the affected USB port can be manipulated to believe that an alternate device is installed e.g. a keyboard or mouse. These fake devices can then be controlled by remote cyber criminals and used to cause untold damage. For example, a keyboard and mouse could be used to take full control of a PC and download further malware. In 2020, the BadUSB malware was involved in a series of attacks which downloaded ransomware to exploit the finances of those attacked, and this could easily happen again.

Staying Safe from Malicious USB Drives

BadUSB has the potential to cause you a serious headache, both in terms of your data and your finances. As a result, it’s crucial that you steer clear of this and similar attacks, an outcome which is possible if you do the following:

  • Be wary of USB drives: while they are not one of the ‘go to’ options for hackers, infected USB drives (and the USB killer) have the capacity to cause real damage. Therefore, if you are presented (or even find) a USB drive which doesn’t belong to your company, do not plug it in to your PC. Instead, ask an IT professional to safely analyze it.
  • Disable USB ports: there’s not a pressing need for your employees to be plugging additional devices into their PC, so it makes sense to disable access to USB ports. Sometimes, this is as simple as blocking any unused ports and, in other scenarios, you may want to restrict access to these ports through administration privileges.
  • Disable Autorun: if your employees do need access to their USB ports, then it may be worth disabling the autorun feature associated with them. This feature allows USB drives to automatically open – and activate their contents – once plugged in. However, with autorun disabled, there is a chance to view the drive’s contents before running it.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


USB drives are vital parts of any IT system, providing external storage and simple file transfers. But they also run the risk of introducing malware to PCs.

We’ve talked in the past about USB drives which can completely destroy a PC, but this new threat is a little different. Believed to have been active in the digital wild since September 2021, Raspberry Robin (as it has been named by researchers) is a strain of malware loaded with a series of dangerous commands. Although it was first discovered in September 2021, researchers noted a sharp uptick in its activity during January 2022. Accordingly, like most malware, it’s likely that its activity will accelerate again in the future, so it’s crucial you know what to look for.

What is Raspberry Robin?

Despite sounding like a charming brand of candy, Raspberry Robin is far from sweet. Instead, it’s a form of malware which is delivered to its victims through an infected USB drive. Quite how Raspberry Robin makes its way onto these USB drives is a question which has security researchers scratching their heads. Regardless of this mystery, however, the fact remains that Raspberry Robin is there and it’s capable of causing digital chaos.

Once the infected USB drive is connected to an active PC, it uses this as a prompt to activate a shortcut link housed on the USB drive. This opens explorer.exe and, most importantly, MsiExec.exe which is used to install new programs in Windows. MsiExec.exe is then used to launch a communication channel to an external domain, from which it will receive malicious commands. Raspberry Robin also harnesses MsiExec.exe to install a malicious .DLL file, although it is yet to be established what the objective of this file is.

Another feature of Raspberry Robin’s attack strategy is to execute the Windows tool fodhelper.exe – this is used to manage features in Windows settings – and instruct rundll32.exe to, in turn, launch further malicious actions. These processes are executed with elevated admin privileges, yet do not require authorization from a User Account Control prompt. While this allows Raspberry Robin unauthorized privileges, it also highlights unusual behavior on a PC and can be used to identify the malware’s presence.

How Can You Avoid Raspberry Robin?

One of the simplest ways to minimize your risk against Raspberry Robin is to never plug unknown USB drives into a PC. Without scanning the drive thoroughly and securely, there is no way of knowing exactly what’s on there. And this can put your PC and indeed your entire IT network at risk.

Likewise, any new USB drives purchased by your organization should be tested by an IT professional on an offline network. This approach will prevent malware such as Raspberry Robin spreading throughout your IT network.

It’s also important that you practice good network monitoring. As Raspberry Robin communicates with external domains, significant traffic will be visible between your network and new, unknown locations. Identifying unusual traffic patterns such as this will allow you to investigate and take care of any concerns.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Data will always be one of the cornerstones of your business. But keeping this data secure in the 21st century is a big ask. So, how do you protect it?

A staggering amount of data is created every single day and your business will contribute to this with each order placed, every service request logged and all the mailing lists you create. Data such as this is sensitive and needs to be protected. If personal details are compromised then they can be used for fraudulent purposes. Your customers need to trust your organization to handle and protect their data correctly. But in a world full of hackers, malware and social engineering it can feel like an uphill struggle.

However, you can make a significant difference to your data protection. And it doesn’t have to be difficult. In fact, you can elevate the security of your data quickly and effectively. All you have to do is follow our 7 tips for keeping your sensitive data secure.

  1. Use Cloud Storage

Individual PCs can become compromised by security breaches. And this means that the data stored on this hardware is up for grabs. But if this data is stored remotely it’s securer and less likely to be stolen. The perfect way to achieve this is by investing in remote cloud storage.

  1. Never Display Passwords

Passwords should never be displayed e.g. written on a Post-It note stuck to your monitor. Hackers don’t have to be external figures, they can easily be an internal threat. Therefore, create passwords which you can remember easily and don’t need to have visible reminders for.

  1. Make Sure Deleted Files are Overwritten

A deleted file isn’t necessarily deleted. And a hacker who knows what they’re doing can easily retrieve those files you thought were deleted for all eternity. But if these deleted files are overwritten enough times then you can make it impossible to retrieve them from your hard drive.

  1. Always Encrypt USB Sticks

USB sticks are useful for carrying around large amounts of data in a small space, but their small size means they’re easy to lose. Therefore, you should always ensure that data on these devices is encrypted and password protected.

  1. Install Anti-Malware Protection

You can never take enough precautions when it comes to data security, so anti-malware software should always form part of your strategy. Malware operates stealthily and can steal your data at a rapid pace. But with anti-malware protection in place you can reduce the risk of malware getting a foothold in your system.

  1. Always Install Updates

PC software and hardware is prone to security vulnerabilities. And these vulnerabilities give hackers the opportunity to access your systems and your data. Installing all updates at the earliest opportunity helps you to avoid having your systems and data compromised.

  1. Destroy Old Hard Drives

Technology advances at a rapid pace and PC hardware can soon become obsolete in the face of newer, faster technology. Hard drives are a case in point. But you need to make sure old hard drives are disposed of correctly. They contain a lot of data, so need to be thoroughly cleaned and then shredded to prevent any sensitive data being made available to external sources.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


We’re living in an age of big data and, as a result, having adequate storage space is a major concern in business. So, what are your storage options?

The days of floppy disks, with their limited 1.44mb storage capability, are well and truly over thanks to a revolution in storage methods. Not only are there more options, but the rapid advance of technology has ensured that we can store even more data in even smaller spaces. However, this wide range of options means that understanding each and every one can be a little bewildering.

Thankfully, we’re here to provide you with a quick education on your options, so let’s get started:

  • Optical Drives: While optical drives such as CDs/DVDs/BluRays may feel a little old fashioned, they still represent a fantastic storage option. Low cost and immune from being remotely hacked, optical drives provide a suitable storage option when it comes to archiving data such as Microsoft Office documents and media files including sound, picture and video.
  • USB Flash Drives: Again, USB drives are relatively traditional storage options, but what marks them out is their accessibility. Perfect for employees who are regularly on the move, the small measurements of a USB flash mean that it can easily be attached to a key ring or simply stored in a pocket. However, their small size is highly deceptive as flash drives are now capable of storing a huge 512GB of data.
  • External Hard Drives: Available in both desktop and portable versions, external hard drives are very similar in design to those found within desktop PCs and laptops. While not as easy to store in your pocket as a USB flash drive, external hard drives come equipped with some serious real estate in terms of storage space. The newest models on the market can hold up to 16TB of data and should never be underestimated in terms of storage space.
  • Network Attached Storage (NAS): Connected directly to networks, an NAS allows your organization to connect several storage drives all at the same time. This allows you to benefit from two major benefits: speed and size. In terms of speed, your data is available to your network almost instantly and makes it perfect for initiating restores. And, when it comes to size, the combination of several devices allows NAS to hold massive amounts of data.
  • Cloud Storage: The newest innovation in data storage, cloud networks offer up a whole new world of possibilities for data storage. Available through third party providers, cloud networks are virtual storage spaces that your organization can hook up to. Significant investment is currently going into cloud computing and this means that crucial factors such as speed and size are almost unparalleled when it comes to storing data in the cloud.

As you can see, there are several major options for you to consider when it comes to data storage. And the beauty of data storage is that you don’t have to stick with just one method. You can mix and match several different methods to provide quick and safe storage options.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More