• You need reliablesecure, and simple data backup, and you need it fast.
  • Over 10 years in the industry
  • Fully compliant with the Privacy and Accounting Regulations in Canada
  • 24/7 Guard and Fire Protected Data Centre
  • 100% Canadian Owned and Operated

Simple, Safe & Secure

watch tutorial button
heading-features

Don't let this happen to you

Cyber Espionage

Cyber Spying – Can You Regain Your Trust in the Internet?

It’s no secret that there have been allegations of government internet spying for years. What many people might not know is that... Read More »
3D Backup Data Crossword

Tapes vs. Online backup - Top 4 Reasons to Consider

We receive a lot of questions when it comes to backup, and one of the more common ones is, “What’s the difference between onli... Read More »
Virus Image

Beware of CryptoLocker Ransomeware!

We briefly mentioned a virus by the name of CryptoLocker in our last blog, and today we’re here to explain a little more in depth about what it is and how it can jeopar... Read More »

FAQ

  • 151-front-street-toOur Data Storage Facilities are located in Toronto with real time duplication to Vancouver.

    Canadian Privacy Laws provide the best protection in the world against data theft and compromise.

    We are now ISO 27001 approved

    Our Data Centre is a state of the art facility incorporating the latest in high security systems such as ….

    A configurable point monitoring and access control system providing powerful means of monitoring building security devices and systems such as card readers, alarm management, recording of data and comprehensive reporting capabilities, as well as, a photo identification system.

    Over 50 closed circuit television (CCTV) cameras located throughout the building monitoring mechanical areas, the tenant floor, the loading dock and high security spaces such as the Meet-Me-Room and hydro vault.

    An adaptable design that allows tenants to have their own proprietary security systems working in conjunction with building security. Access to all high security areas, such as the Meet-Me-Room and Riser Systems require a building chaperone to monitor all visiting personnel. Twelve day up time in the event of a hydro interruption. Backup UPS (Uninterruptible Power Supplies) units insure a smooth transition from street hydro to diesel generators.

    1 gigabit upload speeds Eight fibre trunk lines available for fast and reliable communication.

  • Though some may have understandable concerns about a third party holding their most valuable data, in reality online backups are very secure. Before being transferred, the backup data is encrypted to a 256-bit level – military-grade – making it effectively impossible for anyone to intercept or decrypt the data. You are the only person who can read it.

    Another common concern is the data storage center itself. These are invariably class-A facilities equipped with fire suppression, security cameras, 24/7 security guards,personnel access controls, backup electrical generators, using multiple ISPs, high-end firewalls, and clustering and mirroring techniques to ensure the stored data is always available to client’s.

    We are also ISO 27001-5005 certified. Which guarantees a very high level of security and password encryption. Our tech staff do not have access to your password and if you forget the password we cannot retrieve your data. The password is the encryption key.

    Most organizations have a number of information security controls. However, without an information security management system (ISMS), controls tend to be somewhat disorganized and disjointed, having been implemented often as point solutions to specific situations or simply as a matter of convention. Security controls in operation typically address certain aspects of IT or data security specifically; leaving non-IT information assets (such as paperwork and proprietary knowledge) less protected on the whole. Moreover business continuity planning and physical security may be managed quite independently of IT or information security while Human Resources practices may make little reference to the need to define and assign information security roles and responsibilities throughout the organization.

    ISO/IEC 27001 requires that management:

    • Systematically examine the organization’s information security risks, taking account of the threats, vulnerabilities, and impacts;
    • Design and implement a coherent and comprehensive suite of information security controls and/or other forms of risk treatment (such as risk avoidance or risk transfer) to address those risks that are deemed unacceptable; and
    • Adopt an overarching management process to ensure that the information security controls continue to meet the organization’s information security needs on an ongoing basis.

    The key benefits of 27001 are:

    • It can act as the extension of the current quality system to include security
    • It provides an opportunity to identify and manage risks to key information and systems assets
    • Provides confidence and assurance to trading partners and clients; acts as a marketing tool
    • Allows an independent review and assurance to you on information security practices

    A company may want to adopt ISO 27001 for the following reasons:

    • It is suitable for protecting critical and sensitive information
    • It provides a holistic, risk-based approach to secure information and compliance
    • Demonstrates credibility, trust, satisfaction and confidence with stakeholders, partners, citizens and customers
    • Demonstrates security status according to internationally accepted criteria
    • Creates a market differentiation due to prestige, image and external goodwill
    • If a company is certified once, it is accepted globally.
  • If you own a computer, chances are that you have some important information on it. Whether your hard-drive is home to important emails, documents, pictures, or financial records, the data on your computer is likely playing an increasingly large role in your day-to-day life. With so much riding on these delicate machines, it’s no surprise that the words crash, virus, and stolen laptop can send chills down our spines.

    We’ve all heard horror stories from friends, family, and colleagues about the nightmare that lost data can reap upon us. Backing up is the process of taking your important files and storing them separately from your computer. In this way, if your computer crashes or is infected with a virus, you will still have your important data available to you. When your computer is fixed or replaced, you can then restore your files and continue on with your life. Backups are usually accomplished by periodically copying files to DVDs or cassette tapes.

    When used diligently, these methods are often effective ways of preventing data loss, however, the cost and time associated with creating backups every night means that all but the most diligent among us are usually left without our most recent data when something goes wrong.

  • Online backup is an alternative to optical or tape backup systems. It uses a combination of software and high-speed internet services to automatically make backups of your information every night.

    Using military-grade encryption that only you have the key to, your data is transported to, and stored in, high-security facilities. It is then readily available when you need it, without any tapes, CDs, or nightly rituals to worry about. Think of it as a nightly armoured-car and safety-deposit-box service for your valuable information.

  • Online backups offer several advantages. The main one is the disaster recovery offered by offsite storage, but there are also several advantages in terms of ease of use:

    • No capital outlay is required for purchasing new equipment.
    • There are no ongoing media costs or staff costs.
    • Operational costs are limited to a small monthly fee.

    Setup and installation is a simple matter of downloading the software, and it takes only a few minutes to set up.

    Data recovery is equally fast, as there is no searching for the right tape or waiting for IT staff to recover lost data. The backup process itself is completely automated, which ensures that it gets done right and on-time.