Macrium Blog

Infiltrating government data is highly treacherous and illegal. Cybercriminals may steal government files, share and disclose private information, and disrupt politics to disunify the country. The Cybersecurity and Infrastructure Security Agency, under the United States Department of Homeland Security, defends the government against cyber threats. However, much of the U.S. government tends to have a reactive approach to data management and security. Since data supports government work, cybersecurity risks are high. ...
Posted at Jul 19 2022, 12:00h in backup Macrium Software, Marketing
Categories: backup, crypto-ransomware, cyberattack, cybersecurity, data-security, infosec, macrium, USA, Federal Government

Macrium MultiSite enables you to monitor and manage multiple instances of Macrium Site Manager using one web interface. This web interface is hosted by us using Microsoft Azure virtual machines. Information from the Site Managers is sent securely over an insecure network, the internet, to the virtual machines. This begs the question, how do we keep your information secure from Site Manager to MultiSite? ...
Posted at Jun 13 2022, 12:00h in cybersecurity Jack Mansfield, Marketing
Categories: cybersecurity, data-security, infosec, it-management, macrium-multisite

...
Posted at Dec 20 2021, 12:00h in cybersecurity Erin Osborne, Marketing
Categories: cybersecurity, infosec, macrium-reflect, macrium-software, windows-11

Data disasters come in all shapes and sizes, from personal to global. From fires and floods to theft and old fashioned human error, it can feel like they lurk in the shadows waiting to pounce. ...
Posted at Dec 15 2021, 12:00h in cybersecurity Erin Osborne, Marketing
Categories: cybersecurity, data-security, infosec

I sat down with Macrium’s Technical Director, John Pendleton, to discuss how the landscape of cybersecurity is changing — and how it probably always should! ...
Posted at Sep 17 2021, 12:00h in cyberattack Erin Osborne, Marketing
Categories: cyberattack, cybersecurity, data-security, malware, ransomware, ransomware-protection, software-development