Tag Archives: Data Protection

Fact Check : Fat Bidin Claims On MySejahtera Snooping!

Wan Azlee, who goes by Fat Bidin, claims that MySejahtera is mining private information from our phones.

Find out what he discovered, and what the FACTS really are!

Updated @ 2020-12-03 : Added MySejahtera version history for more context.

Updated @ 2020-12-01 : Added more information, including how to disable permissions in Android and iOS for the paranoid.

Originally posted @ 2020-11-30

 

Fat Bidin : MySejahtera Is Mining Information From Our Phones!

In Episode 41 of Fat Bidin Knows Everything, Wan Azlee claimed (between mouthfuls of oats) that MySejahtera is mining a wealth of private information from our phones.

His evidence? A report by the Exodus Privacy website, stating that MySejahtera has 6 trackers and 24 permissions.

He went through the 24 permissions and made these concerning observations about MySejahtera :

  • it can take control of your phone and pair it with your Bluetooth devices
  • directly call phone numbers
  • find accounts on your phone
  • read your contacts in your phone
  • read the contents of your SD card
  • modify or delete the contents of your SD card
  • prevent your phone from sleeping
  • modify your contacts

Phwoarrrr…. shocking, isn’t it? Wan Azlee / Fat Bidin then asks the Malaysia Ministry of Health to be transparent and tell us what’s going on.

Well, let’s take a closer look at his claims…

 

Fat Bidin On MySejahtera Is Mining Our Information : A Fact Check

Wan Azlee is very articulate, but Fat Bidin honestly doesn’t quite know everything… and here’s why.

Fact #1 : That MySejahtera Version Was From April 2020

Fat Bidin posted his video on 24 November 2020, and we noticed that he was checking an old version of MySejahtera – version 1.0.10, that was posted way back in April 2020.

For the record, there has been FOURTEEN UPDATES since that version :

  • 1.0.11 : 23 April 2020
  • 1.0.12 : 28 April 2020
  • 1.0.13 : 3 May 2020
  • 1.0.15 : 4 May 2020
  • 1.0.16 : 13 May 2020
  • 1.0.17 : 23 May 2020
  • 1.0.18 : 30 May 2020
  • 1.0.19 : 3 June 2020
  • 1.0.20 : 28 June 2020
  • 1.0.21 : 30 June 2020
  • 1.0.22 : 21 July 2020
  • 1.0.23 : 29 July 2020
  • 1.0.24 : 11 August 2020
  • 1.0.25 : 5 November 2020

The latest version of MySejahtera – version 1.0.25 –  was released on 5 November 2020 – 19 days before Wan Azlee posted his video.

Why on Earth would he focus on a 6 month-old version of the app, when there is a much newer version?

Fact #2 : Exodus Posted Their Latest MySejahtera Report On 20 November 2020

Exodus posted their latest report on the latest version of MySejahtera (version 1.0.25) on 20 November 2020 at 10:47 am (as you can see in this screenshot).

That was 4 days before Wan Azlee posted his video, so why didn’t he use this new report instead?

Fact #3 : MySejahtera Has 1 Tracker + 14 Permissions According To Exodus

According to the November 20 Exodus report, MySejahtera has 1 tracker – Google Firebase Analytics, and 14 permissions, of which the highlighted ones were :

  • ACCESS_COARSE_LOCATION : access approximate location (network-based)
  • ACCESS_FINE_LOCATION : access precise location (GPS and network-based)
  • CALL_PHONE : directly call phone numbers
  • CAMERA : take pictures and videos
  • READ_EXTERNAL_STORAGE : read the contents of your SD card
  • WRITE_EXTERNAL_STORAGE : modify or delete the contents of your SD card

We immediately noticed that several controversial permissions are no longer in it :

  • GET_ACCOUNTS : find accounts on the device
  • READ_CONTACTS : read your contacts
  • WRITE_CONTACTS : modify your contacts

So if you are worried that MySejahtera is reading your contacts or modifying them, just UPDATE it to the latest version 1.0.25!

Fact #4 : Actual Permissions Are Fewer

When we checked MySejahtera 1.0.25 as installed in our phone, we found that it actually asked for and used only 11 permissions, instead of 14 as reported by Exodus.

The report also offered a bit more context about those permissions. For instance, location data is only made available when you are actively using the app.

That’s because the location data is used by MySejahtera for its Hotspot Tracker and Locate Health Screening Facility features.

In your phone, you can tap on them for more information on what they allow the app to do.

Fact #5 : Apps Need To Read, Modify + Delete Their Own Data

The permission to read, modify and delete content on our phone may seem ridiculous, but it is a necessity for most apps.

Unless the apps is merely a container for a website or web service, it needs to store data, and modify or delete it when necessary.

Fact #6 : Access To External / SD Card Is Necessary

Most developers will also ask for the permission to read, modify and delete content to the (micro) SD card, because of Adoptable Storage.

Adoptable Storage is a feature that lets smartphones use external storage (like a microSD card) as if it is part of their internal storage.

When a microSD card is used this way, apps like MySejahtera can be installed on it. Therefore, it would require permission to read, modify and delete its own data on the external storage card.

Fact #7 : Android Restricts Data Snooping

Apps that have access to read / modify / write external storage are allowed to access files from other apps. However, this is limited to only these three media collections :

  • MediaStore.Images
  • MediaStore.Video
  • MediaStore.Audio

MySejahtera, or any other app with similar permissions, cannot read / modify / delete data outside of those three media storage locations.

Fact #8 : MySejahtera Has A Privacy Policy

Like all other Android and iOS apps, MySejahtera has a privacy policy, where it is stated clearly that

MySejahtera is owned and operated by the Government of Malaysia. It is administrated by the Ministry of Health (MOH) and assisted by the National Security Council (NSC) and the Malaysian Administrative Modernisation and Management Planning Unit (MAMPU). The Government assures that the collection of your personal information is align with Personal Data Protection Act 2010 (Act 709).

The app will not record user’s Personal Data except with the permission and voluntarily provided by the user. Information collected are used for monitoring and enforcement purposes by Government authorities in dealing with the COVID-19 pandemic. This information is not shared with other organizations for other purposes unless specifically stated.

Fact #9 : You Are Protected By PDPA 2010 (Act 709)

We are all protected by the Personal Data Protection Act 2010 (Act 709).

Anyone who is caught sharing our personal data without permission is be liable to a fine not exceeding three hundred thousand ringgit or to imprisonment for a term not exceeding two years or to both.

Fact #10 : You Can Disable Permissions

You can view and disable any permission that worries you :

Android

  1. Go to Settings > Apps >  MySejahtera > Permissions.
  2. Tap on the permission you don’t want, and select Deny.

Apple iOS

  1. Go to Settings > MySejahtera.
  2. Disable the permissions you don’t want.

But note that doing this will likely break some features in MySejahtera.

Fact #11 : Many Other Apps Are Worse For Your Privacy

When it comes to privacy, we have bigger fishes to fry. Take a look at how many trackers and permissions these four popular apps require.

They make MySejahtera look absolutely privacy-conscious!

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

PowerProtect Data Manager Nov 2020 Update: What’s New?

Dell Technologies just announced enhancements to PowerProtect Data Manager available globally in November 2020!

Find out what’s new in the latest Dell EMC PowerProtect Data Manager!

 

PowerProtect Data Manager : What Is It?

Dell EMC PowerProtect Data Manager provides software-defined data protection, automated discovery, and deduplication for physical, virtual and cloud environments.

Its software-defined architecture allows for greater operational agility, and faster IT transformation, while delivering next-generation data protection.

 

PowerProtect Data Manager November 2020 Update : What’s New?

In its November 2020 update, PowerProtect Data Manager offers these new enhancements :

  • In-cloud workloads in Microsoft Azure and AWS are now protected
  • VMware Tanzu portfolio is now supported
  • Native vCenter Storage Policy-Based Management integrated for VM protection
  • VMware-certified solution to protect VMware Cloud Foundation infrastructure layer.
  • Protection for containerised apps with open source databases, including PostgreSQL and Apache Cassandra, in Kubernetes environments.
  • Customers can now protect Amazon Elastic Kubernetes Service (EKS) and Azure Kubernetes Service (AKS) to back-up Kubernetes cluster-level resources.

 

PowerProtect Data Manager November 2020 Update : Availability

The November 2020 enhancements are available globally with immediate effect.

 

Recommended Reading

Go Back To > Enterprise IT  | Software  | Cybersecurity | Home

Support Tech ARP!

If you like this review, please support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


2020 Dell EMC PowerProtect DP Series IDPA : What’s New?

Dell Technologies just announced the 2020 Dell EMC PowerProtect DP Series appliances!

Here is what you need to know about the next-generation integrated data protection appliances!

 

2020 Dell EMC PowerProtect DP Series : What Is It?

The 2020 PowerProtect DP series is the next-generation family of integrated data protection appliances (IDPA) from Dell Technologies.

They offer a complete solution for backup, recovery, replication, deduplication, cloud readiness with disaster recovery, and long-term rotation to the public cloud!

The 2020 Dell EMC DataProtect DP series are all-in-one data protection solutions that offer :

  • Storage capacities from 8 terabytes to 1 petabyte
  • Greater efficiency, with up to 65:1 data reduction
  • Up to 38% faster backups, and up to 45% faster restores, compared to previous generation.
  • Instant access and restore of up to 50% greater IOPS, compared to previous generation.
  • Consumes up to 23% less power than the previous generation
  • Cloud long-term retention, and cloud DR-ready
  • VMware integration

The 2020 Dell EMC DataProtect DP series is also guaranteed under the Future-Proof Program, and is part of the Dell Technologies on Demand program.

 

2020 Dell EMC PowerProtect DP Series : Models + Key Specifications

The 2020 Dell EMC PowerProtect DP series consists of four models – DP4400, DP5900, DP8400 and DP8900. Here are their key specifications.

Specifications DP4400 DP5900 DP8400 DP8900
Physical Capacity 8 TB to 96 TB 96 TB to 288 TB 192 TB to 768 TB 576 TB to 1 PB
Physical Capacity
with Cloud Tier
Up to 288 TB Up to 864 TB Up to 2.3 PB Up to 3 PB
Logical Capacity Up to 4.8 PB Up to 18.7 PB Up to 49.9 PB Up to 65 PB
Logical Capacity
with Cloud Tier
Up to 14.4 PB Up to 56.1 PB Up to 149.7 PB Up to 195 PB
Max Throughput Up to 9 TB/hr Up to 33 TB/hr Up to 57 TB/hr Up to 94 TB/hr
Drive Type SAS 12 TB SAS 4 TB SAS 8 TB SAS 8 TB
Networking 8 x RJ45, or
8 x SFP
4 x 40 GbE uplinks
Each Quad SFP port can be split into 4 x 10 GbE
Max. Power 475 VA 2,830 VA 5,480 VA 7,250 VA
Thermal Rating 1,620 BTU/hr 9,300 BTU/hr 17,800 BTU/hr 23,400 BTU/hr

 

2020 Dell EMC PowerProtect DP Series : Availability

The 2020 Dell EMC PowerProtect series appliances – DP4400, DP5900, DP8400 and DP8900 – will be available globally in December 2020.

 

Recommended Reading

Go Back To > Enterprise IT  | Cybersecurity | Home

Support Tech ARP!

If you like this review, please support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Lazada RedMart Data Breach : What You Need To Know!

Lazada just admitted that a data breach involving their RedMart customer database that could affect some 1.1 million customers!

Find out what happened, and what it could mean for Lazada and RedMart customers!

 

Lazada RedMart : What Is It?

RedMart is an online grocery platform in Singapore that was founded in August 2011.

Lazada acquired RedMart in November 2016, and started to integrate it into their platform in March 2019.

This March 2019 date is important, because that was when the RedMart database was last updated.

 

Lazada RedMart Data Breach : What Happened?

The Lazada RedMart database was spotted for same in an online forum, amongst many other databases stolen from other e-commerce websites.

In this screenshot, you can see that it claims to have details on 1.1 million Lazada RedMart customers :

  • Email address
  • Password
  • Mailing address
  • Name
  • Phone number
  • Partial credit card information

Picture Credit : CNA

In a statement posted on 30 October 2020, Lazada confirmed the data breach involving their RedMart database.

They assert that only the old RedMart database that was “18 months out of date” when it was last updated in March 2019.

Singapore, 30 October 2020 – Lazada places great importance on protecting your personal information, and we value the trust you have placed with us. On 29 October 2020, as part of our proactive monitoring, our cybersecurity team discovered a data security incident in Singapore, involving a RedMart-only database hosted on a third-party service provider. The customer data hosted on this database is more than 18 months out of date as it was last updated in March 2019.

The customer information that was illegally accessed include the names, phone numbers, emails, addresses, encrypted passwords and partial credit card numbers of RedMart customers. We have taken immediate action to block unauthorised access to the database. This data was used on the previous RedMart app and website, which are no longer in use. Lazada customer data in Southeast Asia is not affected by this incident.

Protecting the data and privacy of our users is of utmost importance to us. Apart from reviewing and fortifying our security infrastructure, we are working very closely with the relevant authorities on this incident and remain committed to providing all necessary support to our users.

We want to be transparent about this incident with all of our customers and reassure you that we are taking it seriously.

They also set their platform to log out all Lazada users, and require them to register a new password.

They are also warning their users to be on the alert for spam mails requesting personal information.

 

Lazada RedMart Data Breach : What’s The Implication?

A Data Breach Is A Data Breach Is A Data Breach

Lazada may claim that the data and privacy of their users are of the utmost importance, but the data breach says otherwise.

They left a database they no longer used since March 2019 on a third-party service provider, and accessible online all this time.

Any half-decent cybersecurity specialist would have told them to take the database offline, unless it was essential to the operation of the website.

Closing The Barn Door After The Horses Have Bolted

Lazada immediately blocked unauthorised access to their RedMart database, but that’s like closing the barn door after the horses have bolted.

Once the data was stolen, all it does is prevent other attackers from stealing the data for themselves.

Lazada Migrated RedMart Users In March 2016

It seems a little disingenuous for Lazada to announce that the data was used in “the previous RedMart app and website, which are no longer in use“.

They appear to have migrated RedMart users to Lazada on 15 March 2016 using the same data that was just stolen.

Unless RedMart users changed their passwords, addresses, phone numbers, email addresses or credit card details AFTER they were migrated to the Lazada platform, they remain exposed by the data breach.

The Data Isn’t Necessarily Outdated

Most of us don’t change our logins and passwords that often. And we often reuse the same login and password combination for different websites.

So it is scant assurance that their RedMart database was last updated in March 2019, even if we take their word that it was more than 18 months out of date.

This data breach exposes all affected RedMart users to the possibility of their other accounts being breached as well.

Only Ex-RedMart Users Affected

The only saving grace we can see here is that it looks like only former RedMart users are affected by this data breach.

That means Lazada users who never registered or used the RedMart app or website are not affected.

 

Lazada RedMart Data Breach : What Can You Do?

If you ever registered for, or used, RedMart before their migration to the Lazada platform in March 2016, we highly recommend that you :

  • change your Lazada password
  • change the password of accounts that use the same password as your Lazada / RedMart account
  • do NOT click on links in emails warning you about this data breach and asking you to change your password
  • do NOT respond to calls or messages warning you about this data breach
  • do NOT respond to requests for personal information

 

Recommended Reading

Go Back To > Cybersecurity | Business | Home

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

TikTok Caught Spying What We Type In Other Apps… TWICE!

TikTok was caught spying on what we type in other apps, not once, but TWICE… so far.

Find out what’s going on, and what you should do about it!

 

TikTok : What Is It?

TikTok is a Chinese social networking service built around short video clips. Developed and owned by ByteDance which is based in Beijing, it is very popular amongst young people and even children.

This has led to numerous controversies as TikTok proved slow or reluctant to remove dangerous or racist videos :

 

TikTok Caught Spying What We Type In Other Apps… TWICE!

Beyond their obvious desire to grow their service at the expense of the danger to real people, there have been cybersecurity and privacy concerns about TikTok.

In a space of just four months, TikTok has been caught spying on what we type in OTHER APPS… not once, but TWICE. Take a look at this video expose…

TikTok Caught Spying On What We Type : First Time

Let’s start in March 2020, when Talal Has Bakry and Tommy Mysk exposed how they found that TikTok was spying on what we typed in other apps through the pasteboard / clipboard.

In the video above, you can see how TikTok immediately asked to read all text stored in the pasteboard, whenever it is launched.

The pasteboard contains everything you copied earlier – messages from other people, quotes from an article, or far more sensitive stuff like your password or account number.

And because of Apple’s universal clipboard feature, this means everything you copy on your Mac or iPad will be available on your iPhone, and therefore TikTok.

To be clear, TikTok was just one of the many apps that they found to be spying on what we type. Here were the apps they confirmed were spying on the pasteboard / clipboard.

News Games Social Other
ABC News
Al Jazeera English
CBS News
CNBC
Fox News
News Break
New York Times
NPR
itv Nachrichten
Reuters
Russia Today
Stern Nachrichten
The Economist
The Huffington Post
The Wall Street Journal
VICE News
8 Ball Pool
AMAZE!!!
Bejeweled
Block Puzzle
Classic Bejeweled
Classic Bejeweled HD
Flip The Gun
Fruit Ninja
Golfmasters
Letter Soup
Love Nikki
My Emma
Plants vs. Zombies Heroes
Pooking – Billiards City
PUBG Mobile
Tomb of the Mask
Tomb of the Mask: Color
Total Party Kill
Watermarbling
TikTok
ToTalk
Tok
Truecaller
Viber
Weibo
Zoosk
10% Happier: Meditation
5-0 Radio Police Scanner
Accuweather
AliExpress Shopping
Bed Bath & Beyond
Dazn
Hotels.com
Hotel Tonight
Overstock
Pigment – Adult Coloring Book
Recolor Coloring Book to Color
Sky Ticket
The Weather Network

At that time, TikTok told Zak Doffman that it was Google Ads that was snooping into the pasteboard / clipboard.

The clipboard access issues showed up due to third-party SDKs, in our case an older version Google Ads SDK. We are in the processes of updating so that the third-party SDK will no longer have access.

They claimed it was because TikTok was using an older Google Ads SDK, which they have since replaced with a newer version.

TikTok Caught Spying On What We Type : Second Time

BFast forward to June, and the release of iOS 14 beta. The new clipboard warning feature in iOS 14 appears to have caught TikTok spying on the pasteboard / clipboard once again.

In the dramatic video shared by Jeremy Burge – the 1:35 point in our video above – he shows TikTok grabbing the contents of his iPhone’s clipboard every 1-3 keystrokes, as he typed in Instagram!

This is even more egregious than the first time they spied on the pasteboard / clipboard! Instead of just looking at what you copied into the clipboard earlier, TikTok is literally reading what you are typing in a different app!

TikTok now claims that this issue was “triggered by a feature designed to identify repetitive, spammy behaviour“, and that they have already submitted an updated app without this “anti-spam feature“.

 

TikTok Caught Spying : What Should YOU Do?

If you are not a frequent TikTok user, the answer is simple – UNINSTALL TikTok.

If you really like TikTok, you should immediately update to the latest version, which ByteDance claims will no longer read your clipboard because it has both an updated Google Ads SDK, as well as their anti-spam feature removed.

Either way, if you are concerned about privacy issues with TikTok, you should write to privacy@tiktok.com and express your deep concerns about not letting them read what you are typing, whether it is in their app or other apps.

 

Recommended Reading

Go Back To > Cybersecurity | Software | MobileHome

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Dell EMC PowerProtect DD for Multi-Cloud Data Protection

At Dell Technologies Forum 2019, Dell Technologies announced their next-generation Data Domain protection storage appliances – the Dell EMC PowerProtect DD Appliance.

They also announced changes and improvements to Dell EMC Cyber Recovery and PowerProtect Software.

Here is everything you need to know about the new Dell EMC PowerProtect DD Appliances, as well as Cyber Recovery and PowerProtect software updates.

 

The Need For Dell EMC PowerProtect DD

As businesses become more data-driven, there is a corresponding increase in the amount of data they create and retain.

According to Dell EMC, organisations in Asia Pacific and Japan manage an average of 8.13 petabytes of data in 2018 – a 384% increase over 2016.

All that data is vulnerable, even if they are stored in the cloud. That’s where Dell EMC comes in with their PowerProtect DD Series Appliances.

They are designed to protect a business’ data storage, with the ability to quickly restore their systems in times of disruption to ensure business continuity.

 

Dell EMC PowerProtect DD for Multi-Cloud Data Protection

The new PowerProtect DD appliances are the latest addition to the Dell EMC PowerProtect portfolio. Designed to offer data protection for multi-cloud workloads, PowerProtect DD offers :

Faster Performance

The PowerProtect DD appliances offer up to 38% faster backups, and up to 36% faster restores.

They can provide instant access and instant restores of up to 60,000 IOPS for up to 64 virtual machines, with support for 25 GbE and 100 GbE network speeds.

Greater Efficiency

PowerProtect DD can provide up to 1.25 PB of usable capacity in a single rack, with hardware-assisted compression to increase logical capacity by up to 30%.

Its small footprint also saves power and cooling requirements by up to 35%, increasing ROI for organisations.

Scalability

PowerProtect DD is scalable, with grow-in-place capacity expansion from 1 terabyte all the way to 1.25 petabytes.

Data Protection For Multi-Cloud Workloads

PowerProtect DD supports multiple public clouds, and can natively tier deduplicated data. It can also scale across on-premise and hybrid cloud environments.

Single Pane of Glass Management

Its PowerProtect DD Management Center allows for the aggregated management for multiple systems. Customers can monitor the health and status of all their appliances on-premise and in the cloud, as well as manage capacity and replications.

 

Improved Cyber Recovery + PowerProtect Software

Dell EMC also announced improvements to Cyber Recovery and PowerProtect Software :

  • Cyber Recovery now supports workloads protected with PowerProtect Software and stored on the new PowerProtect DD Series Appliances
  • Cyber Recovery can now automate restores from a secure and isolated vault, giving customers an additional layer of data protection
  • PowerProtect Software adds more integrated with VMware vSphere, offering simplified data protection management and self-service recovery
  • PowerProtect Software also now supports Dell EMC Cloud Disaster Recovery, allowing the automated disaster recovery of VMware workloads in the public cloud

 

Dell EMC PowerProtect DD Availability

The three new PowerProtect DD Series Appliances – PowerProtect DD6900, PowerProtect DD9400 and PowerProtect DD9900 – will be available globally 30 September 2019 onwards through Dell Technologies channel partners

Dell EMC Data Domain Virtual Edition and Dell EMC Data Domain DD3300, now branded Dell EMC PowerProtect DD Virtual Edition and Dell EMC PowerProtect DD3300, are available now

Enhancements to Dell EMC PowerProtect Cyber Recovery and PowerProtect Software are available globally, with immediate effect.

 

Recommended Reading

Go Back To > Computer Systems | Business + Enterprise | Home

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Acronis True Image 2020 – Everything You Need To Know!

Acronis True Image 2020 was just released, and it is the first personal data protection solution to automate the 3-2-1 backup rule!

Here is EVERYTHING you need to know about Acronis True Image 2020!

 

Acronis True Image 2020

Acronis True Image 2020 is the first major update since True Image 2018 was released two years ago.

With this release, Acronis believes it has successfully addresses all Five Vectors of Cyber Protection – ensuring the safety, accessibility, privacy, authenticity and security of the user’s data (SAPAS).

Like its predecessor, it combines data backup and recovery capabilities, with anti-malware technology. The new release though boasts more than 100 enhancements. Let’s take a look at some of them…

Dual Protection In True Image 2020

Acronis True Image 2020 is the first personal data protection solution to automate the 3-2-1 backup rule.

It will automatically replicate local backups into the cloud, so you will always have an off-site copy for recovery.

After you completed the first backup, the backup and replication process will henceforth occur simultaneously.

True Image 2020 Tray Notifications Center

Acronis True Image 2020 now pushes messages about your data to your desktop tray, so you can easily monitor the status of your backups.

In addition to alerting you to urgent issues that require your response, it will also send you tips on how to enhance your computer’s protection.

Back Up Only On Selected Wi-Fi Networks

You will now have greater control, including the ability to select which Wi-Fi network to transfer your back-ups.

This allows you to avoid costly metered connections, and insecure public networks that could put your data at risk.

Custom Power Management

You will also have control on when your backups will run while you are on battery power. You can :

[adrotate group=”2″]
  • completely prevent backups whenever you are on battery power,
  • set a minimum power level for backups to run

Mac Power Nap Backups!

Acronis True Image 2020 will support Power Nap backups. Enable it, and your Mac will backup its data during its Power Nap.

In addition, any changes to your Mac’s data during its Power Nap will be captured in those backups too!

 

Acronis True Image 2020 Price + Availability

Acronis True Image 2020 is available in three versions, with immediate effect :

Standard Edition

This is a perpetual license designed for customers who store their data on local drives only.

It does not come with cloud storage or cloud-based features. However, you can make local backups of an unlimited number of mobile devices.

Pricing starts at $49.99 for one computer.

Advanced Edition

This is a one-year subscription that includes 250 GB of Acronis Cloud Storage, and access to all cloud-based features.

You will be able to make both local and cloud backups of an unlimited number of mobile devices.

Pricing starts at $49.99 per year for one computer.

Premium Edition

This is a one-year subscription that includes blockchain-based data certification and electronic signature capabilities, as well as 1 TB of Acronis Cloud Storage.

Pricing starts at $99.99 per year for one computer.

All versions include Acronis Active Protection – an AI-powered anti-malware protection, and covers an unlimited number of mobile devices.

 

Recommended Reading

Go Back To >  Software | Cybersecurity | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

The 2019 Dell EMC Unity XT + PowerProtect Primer!

One of big stories out of Dell Technologies World 2019 was about new Dell storage and data management solutions, like Unity XT and PowerProtect.

Here is our primer on the new Dell EMC Unity XT unified storage solutions, the Dell EMC PowerProtect data management platform, as well as updates on Isilon and more!

 

The 2019 Dell Storage + Data Management Solutions Revealed!

In the following 30-minute long video, we have top guns from Dell EMC to showcase the 2019 Dell storage and data management solutions :

  • Jeff Clarke (Vice Chairman, Dell Technologies),
  • John Roese (Dell Technologies President & Dell EMC Chief Technology Officer),
  • Craig Bernero (Senior Vice President, Dell EMC Midrange & Entry Storage),
  • Beth Phalen (President & General Manager of Dell EMC Data Protection), and
  • Chad Dunn (Vice President of Product Management, Dell EMC Hyperconverged Infrastructure)

 

The 2019 Dell EMC Unity XT

The next-generation Dell EMC Unity XT midrange storage system is up to 2X faster than its predecessor, and 67% faster than its nearest competitor.

Optimised for greater data efficiency with up to 5:1 data reduction and 85% system efficiency, the Unity XT is built for a multi-cloud world.

The new Unity XT can run in a public cloud, seamlessly move data to the cloud, and is available as a service through the new Dell EMC Cloud Storage Services. It can also be used as a building block for Dell Technologies Cloud, as part of a validated design.

Unity XT storage arrays use an active-active architecture, and is NVMe-ready. They are designed to simultaneously run applications, process file and block inline data reduction, while delivering operational data services.

 

Dell EMC Isilon Update

Dell EMC also announced a new Isilon release with greatly improved scalability, as well as enhanced cloud integration and security.

The new Isilon OneFS 8.2 provides up to 75% greater cluster scalabilityup to 252 nodes, 58 PB of storage, and 945 GB/s of aggregate throughput per cluster!

 

Dell EMC Cloud Storage Services

To support enterprises looking to extend their on-premise infrastructure to public cloud, Dell Technologies is introducing the Dell EMC Cloud Storage Services.

The new Cloud Storage Services uses Dell EMC storage directly connected to the public cloud through a managed service provider, to give customers multi-cloud agility.

Furthermore, VMware customers can also leverage the automated disaster-recovery-as-a-service (DRaaS) in VMware Cloud on AWS.

 

Dell EMC PowerProtect

Dell EMC also introduced their PowerProtect Software platform, and the Dell EMC PowerProtect X400 multi-dimensional appliance.

The Dell EMC PowerProtect Software platform delivers data protection, replication and reuse, as well as SaaS-based management and self-service capabilities. The data owner now has the autonomy to control backup and recovery operations.

VMware customers will benefit from a simple data management solution for their vSphere environments, with automated policy-based backup and recovery, as well as integration with vRealize Automation.

Available as a hybrid, or all-flash data management appliance, the Dell EMC PowerProtect X400 can scale-up with grow-in-place capacity expansion, and scale-out compute power and capacity.

It is also the first Dell EMC data management solution to leverage machine learning for intelligent load balancing.

 

Dell EMC Integrated Data Protection Appliance

For small- and medium-sized businesses looking for improved data protection in an integrated appliance, Dell EMC is offering the Dell EMC DP4400 Integrated Data Protection Appliance with 8 to 24 TB of storage.

The lower storage capacity version of IDPA DP4400 makes it ideal for smaller organisations. yet, it has the ability to grow-in-place up to 96 TB, with the purchase of licence keys and an upgrade kit.

 

Recommended Reading

Go Back To > Business + Enterprise | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


The 2019 Dell EMC Global Data Protection Index Summarised!

The 2019 Dell EMC Global Data Protection Index is out! Here is a summary of its key findings!

 

The 2019 Dell EMC Global Data Protection Index

The 2019 Dell EMC Global Data Protection Index is the third survey conducted by Dell EMC in collaboration with Vanson Bourne.

The survey involved 2,200 IT decision makers from public and private organisations (of 250+ employees) across 18 countries and 11 industries. It was designed to reveal the state of data protection in the Asia Pacific and Japan region.

 

What Did The 2019 Data Protection Index Reveal?

The 2019 Dell EMC Global Data Protection Index revealed a large increase in the amount of data managed – from 1.68 petabytes in 2016 to a staggering 8.13 petabytes in 2018.

They also saw a corresponding increase in awareness about the value of data, with 90% of the respondents aware about the value of the data they manage. However, only 35% are monetising their data.

The Index also noted that despite an impressive jump in the number of data protection leaders (from 1% to 13%) and “adopters” (from 8% to 53%) since 2016, most of the survey respondents still face challenges in implementing the right data protection measures.

  • Organisations in Asia Pacific & Japan managed 8.13 PB of data in 2018 – an explosive growth of 384% compared to the 1.68 PB managed in 2016
  • 90% of businesses see the potential value of data but only 35% are monetising it
  • 94% face data protection challenges, and 43% struggle to find suitable data protection solutions for newer technologies like artificial intelligence and machine learning
  • More than a third (34%) of respondents are very confident that their data protection infrastructure is compliant with regional regulations, but only 18% believe their data protection solutions will meet all future challenges

 

The State Of Data Protection In APJ

Data disruptions and data loss happen more frequently in APJ organisations, than the global average. Some 80% of the APJ respondents reported experiencing some type of disruption over the last 12 months.

This is higher than the global average of 76%. Even worse – 32% were unable to recover their data using existing data protection solutions.

Although system downtime is a problem, the loss of data is particularly expensive. On average, 20 hours of downtime cost businesses US$ 494,869. The average data loss of 2.04 terabytes, on the other hand, costs nearly twice as much at US$ 939,703.

 

Challenges To Data Protection In APJ

The vast majority of respondents (some 94%) report that they encounter at least one barrier to data protection. The top three challenges in APJ was determined to be  :

  1. The inability to keep track of and protect all data because of growth of DevOps and cloud development – 46% agree
  2. The complexity of configuring and operating data protection software/hardware – 45.6% agree
  3. The lack of data protection solutions for emerging technologies– 43.4% agree

They also struggled to find adequate data protection solutions for newer technologies :

  • Artificial intelligence and machine learning data – 54% agree
  • Cloud-native applications – 49% agree
  • Internet of Things – 40% agree

 

Cloud Is Changing The Data Protection Landscape

[adrotate group=”2″]

According to the 2019 Dell EMC Global Data Protection Index, organisations have increase their use of public cloud services – up from 27% in 2016 to 41% in 2018.

Nearly all of those organisations (99%) using public cloud, are leveraging it as part of their data protection strategy. The top use case – backup or snapshot services to protect data and workloads.

More than 60% of the respondents also consider the scalability of data protection solutions important, in anticipation of the inevitable boom of cloud workloads.

 

Regulation Is Not A Key Concern

Compliance with data privacy regulations like the UE’s General Data Protection Regulation (GDPR) is not a key concern for most of these organisations. Only 36% listed it as a top data protection challenge.

 

Recommended Reading

Go Back To > Enterprise + Business | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Acronis True Image 2017 Personal Backup Software Launched

3 October 2016 – Acronis today announced Acronis True Image 2017, the latest release of the world’s fastest personal backup software.

The 2017 release provides the most complete personal data protection available on the market. Acronis True Image 2017 combines the unmatched Acronis full image local and cloud backup for computers with new wireless backup for mobile devices to local Windows computers or the secure Acronis Cloud, support for an unlimited number of mobile devices, and complete backup of Facebook account data.

“Personal data is increasingly residing on mobile devices and in social media accounts,” said Serguei Beloussov, co-founder, and CEO of Acronis. “Acronis True Image 2017 protects all data no matter where it resides and provides the fastest and easiest backup in the industry.”

Acronis True Image 2017

The Fastest Acronis True Image ever

Acronis True Image technology is the fastest full image backup and recovery software for personal use on the market, including:

  • Three to six times faster on Windows computers than competing products for backing up and recovering using an external USB 3.0 drive.
  • 30% faster than Apple Time Machine on Apple computers.
  • 60% faster than previous versions of Acronis True Image in popular scenarios.

As a global partner of the Scuderia Toro Rosso Formula 1 Racing Team, Acronis puts its technologies to the test in workloads demanded by the most technologically advanced sport.

“Instant access to the massive amounts of data we generate every race is an absolute requirement for our team to be successful” said Scuderia Toro Rosso Team Principal Franz Tost. “If we lose data even for a few seconds, the race is lost, which is why we rely on Acronis for the most complete backup.”

[adrotate banner=”5″]

 

The #1 Personal Backup Software for Complete Data Protection

With fast, easy, and complete data protection, Acronis True Image 2017 delivers more than 50 new features, including:

  • Wireless mobile device backup to Windows computers – Backup an unlimited number of iPhones, iPads, and Android mobile devices to your computer at the full speed of your local Wi-Fi network. Recover all content to the same or another device, even if it’s just a single photo or contact.
  • Remote backup management – Protect all your computers and help family members with protecting theirs, even if they are far away. Review the data protection status in real-time for any computer or mobile device data via a touch-friendly online dashboard.
  • Incremental Facebook backup – Automatically back up all your Facebook account content, including photos, videos, contacts, comments, and likes. Users are protected from accidental deletions, hacker attacks, application failures, or social network errors that can erase precious memories.
  • Archiving to the cloud or external storage devices – Free up disk space by moving large or rarely used files from your Windows or Apple computer to an external drive, NAS device, network share, or the Acronis Cloud. Access the archives by using File Explorer, Finder, or a web browser.
  • Enhanced NAS – Automatically discover NAS devices available on the local network, pre-configuring them for backup storage, and automatically re-connecting them if they are temporarily unavailable.

Acronis True Image 2017 has many additional new features, such as search in local and Cloud backups, encryption for archives, comments for backups, Windows Explorer integration, a refreshed touch-friendly user interface on iOS and Android devices, and much more.

 

Availability and Pricing

Acronis True Image 2017 is available for purchase as a perpetual license, starting at US$49.99, or a subscription, starting at US$39.99 per year.

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Cisco & Dimension Data Protect Rhinos By Tracking People

22 April 2016 – South Africa-headquartered technology company, Dimension Data, and worldwide leader in networking, Cisco, today announced an initiative aimed at dramatically reducing the number of rhinos being poached in South Africa.

The two companies have deployed some of the world’s most sophisticated technology in an unnamed private game reserve adjacent to the world-renowned Kruger National Park to monitor and track individuals from the time they enter the reserve gates, until they exit.

The goal is to proactively intervene and stop people entering the reserve illegally – whether it’s cutting fences, being dropped onto the ground by helicopters, or simply driving in through the entrance gates.

 

Over time, the technology will be replicated in other reserves in South Africa, Africa, and globally, to not only protect rhino, but conserve other endangered species including elephants, lions, pangolin, tigers in India and Asia, and even sea rays in the ocean.

According to the South African Department of Environmental Affairs’ Report 2015, a staggering 1,215 rhinos were killed by poachers in 2014 alone. This equates to three rhinos being killed every day. If the rate of poaching continues, rhino deaths could overtake rhino births by 2018, and the rhino could be non-existent in South Africa by 2025.

Dimension Data executive, Bruce Watson explains: “Every day, hundreds of staff, suppliers, contractors, security personnel, and tourists enter and exit game reserves. The human activity in these environments is not monitored because, typically, the reserve is in a remote location with basic IT infrastructure and access control, manual security processes, and very limited communication.”

“With our Connected Conservation technology, we don’t touch the animals by darting them with tranquilisers to insert sensors into their horns, or insert a chip under their skin. This can be extremely stressful and risky for the animal, and we’ve seen a number of rhinos either dying, or going blind, and having to be euthanased.”

[adrotate banner=”5″]

In phase one, Dimension Data worked closely with Cisco, to gather information from the game rangers, security personnel, technology, and control centre teams. The first step was to create a secure Reserve Area Network (RAN) and install Wi-Fi hotspots around key points, which is completed.

Phase two of the Connected Conservation project will incorporate CCTV, drones with infrared cameras; thermal imaging, vehicle tracking sensors, as well as seismic sensors on a highly secure intelligent network. Dimension Data has also deployed Cisco’s Reserve Area Networks (RANs) which will be one of the first installations of its kind in the world.

Chris Dedicoat, executive vice president of Worldwide Sales for Cisco said: “South Africa is currently home to about 70% of the remaining rhinos in the world, most of which are located in the Kruger National Park, which drove the decision to pilot Connected Conservation. In close collaboration with Dimension Data, the teams moved rapidly to study and build a highly secure digital solution that provides those who are protecting the rhinos with the valuable insights, transparency and visibility they need to make effective and informed decisions against poaching.”

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participate in the Tech ARP Forums, or even donate to our fund. Any help you can render is greatly appreciated!

New 2016 Dell Data Protection Solutions Announced

KUALA LUMPUR, Malaysia, February 29, 2016 – Dell today announced a series of new data protection solutions to help organizations better protect business-critical systems, applications, and data – either on premises or in the cloud. Offerings include:

  • the general availability of Dell Data Protection | Rapid Recovery;
  • three new data deduplication appliances models;
  • new Dell Data Protection | Endpoint Recovery – Free Edition; and
  • the new Dell Data Protection | NetVault Backup 11.

These updates to the data protection product portfolio reinforce Dell’s commitment to driving innovation and giving customers the choice and flexibility they need to quickly address evolving backup and recovery needs as they move data and applications to the cloud.

 

Instant Recovery For The Cloud Era With Dell Data Protection | Rapid Recovery, Now Available

Generally available today, Dell Data Protection | Rapid Recovery integrates proven and familiar features of AppAssure and other leading Dell IP to help eliminate downtime for customer environments. Customers can attain ZeroImpact recovery of systems, applications and data across physical, virtual and cloud environments. Rapid Snap for Applications technology takes snapshots of entire physical or virtual environments up to every five minutes.

This gives users immediate access to data in the event of an incident and the power to restore in real time as if nothing ever happened. In addition, Rapid Snap for Virtual technology offers agentless protection of VMware VMs.

 

Backup More And Store Less With New DR Series Deduplication Appliances

New releases to the award-winning Dell DR series of deduplication appliances include the new Dell DR4300e, DR4300 and DR6300. The new Dell DR appliances deliver increased capacity, speed and performance, enabling customers to backup more data and store less. Dell DR appliances leverage the industry’s first, free source-side deduplication capabilities to relieve network bandwidth congestion and boost ingest performance, ensuring that backups get completed on time, every time.

  • An ideal fit for mid-market organizations, the DR4300 delivers up to 108TB of usable capacity while ingesting up to 23TB of data per hour. The entry-level DR4300e is a smaller scale, low-cost appliance that can scale up to 27TB while offering all the features of the DR Series. With these offerings, small and mid-market organizations can now easily adopt enterprise-grade data deduplication capabilities that have traditionally been out of reach.
  • The DR6300 is a larger midmarket and small enterprise solution that delivers up to 360TB of usable capacity while ingesting up to 29TB of data per hour, delivering the scalability needed to support growing environments.

Built on the latest 13th generation Dell PowerEdge servers, Dell DR appliances support 16 of the industry’s leading backup applications and can easily be added to an existing data protection environment. Combining deduplication ratios from 15:1 up to 30:1 with a flexible, all-inclusive licensing model, Dell DR appliances deliver better performance at a lower cost than competing offerings.

 

Freemium Protection And Recovery For Windows Clients

To help companies protect the growing volumes of data created by endpoint devices, Dell Data Protection | Endpoint Recovery – Free Edition will be available in a light-weight, easy-to-use software offering that gives customers a robust endpoint protection and recovery solution for Windows clients.

A no-cost, set-and-forget client protection solution designed for a single user, the freemium offering provides file deduplication and compression to reduce storage costs and enables fast recovery of lost data.

 

Increase Scalability And Performance With Dell Data Protection | NetVault Backup v11

Dell NetVault Backup is a cross-platform, enterprise backup and recovery solution that offers one of the broadest spectrums of OS, application, and backup target support in the industry. Version 11 delivers the increased scalability and improved performance needed to simplify backup in even the most diverse and rapidly growing IT environments.

New features of Dell Data Protection | NetVault Backup 11 include:

  • Enterprise Windows client deployment manager that allows customers to target up to 1,000 clients for automated installation, increasing both efficiency and scalability.
  • High-performance file system multi-streaming capability that allows customers to break up backups into smaller, simultaneously executed chunks to increase performance.
  • Restartable VMware backups so users pick up where a job left off.

 

Strengthening A Powerhouse Portfolio

[adrotate group=”2″]

Dell Data Protection solutions deliver an unmatched depth and breadth of capabilities to help customers instantly restore the critical systems, data, and applications that power their businesses, even before the business knows they are down. More than 70,000 customers worldwide use Dell Data Protection solutions to protect everything from laptops, desktops, and tablets, to physical and virtual servers, to public and private cloud environments.

All Dell Data Protection solutions are developed with a mid-market design point and are scalable, easy to use, and cost-effective. This allows organizations to spend less time worrying about whether their apps and data will be available, and more time focused on using them to innovate and transform the business.

 

Dell Data Protection Availability:

  • Dell Data Protection | Rapid Recovery is available now worldwide. A free upgrade for current AppAssure license holders is also available.
  • The Dell DR4300e, DR4300 and DR6300 are available now worldwide.
  • Dell Data Protection | Endpoint Recovery – Free Edition will be available worldwide beginning in early March.
  • Dell NetVault Backup 11 is available now worldwide.

Go Back To > Enterprise | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

New Dell Data Protection Endpoint Security Suite Launched

KUALA LUMPUR, Malaysia – February 16, 2016 – Dell today announced the availability of the Dell Data Protection | Endpoint Security Suite Enterprise, which integrates Cylance technology using artificial intelligence and machine learning to proactively prevent advanced persistent threats and malware.

As part of this solution, Dell also announced the availability of a new post-boot BIOS verification solution for Dell commercial PCs, which allows customers to ensure their device remains free from malware during the boot process. The post-boot BIOS verification solution will be integrated on Dell commercial PCs with the purchase of the Dell Data Protection | Endpoint Security Suite Enterprise license.

The new BIOS verification functionality uses a secure cloud environment to compare and test an individual BIOS image against the official measurements held in the Dell BIOS lab. By conducting this test in an off-device environment, users can be assured that the post-boot image is not compromised as the testing takes place in a secure cloud platform and not on a potentially infected device. The verification helps extend security throughout the entire device lifecycle and provides greater visibility for administrators wanting to stop malicious BIOS attacks.

The BIOS verification feature will initially be available on Dell’s range of commercial PCs with a 6th Generation Intel chipset, which includes the widely applauded portfolio of Latitude PCs that were recently announced at CES, as well as select Dell Precision, OptiPlex, and XPS PCs and Dell Venue Pro tablets.

[adrotate banner=”4″]With this functionality, Dell strengthens its ability to provide the most secure commercial PCs in the industry today with best-in-class endpoint security solutions from the Dell Data Protection suite, including comprehensive encryption, advanced authentication and leading-edge malware protection from a single source – and now also BIOS verification.

The Dell Data Protection | Endpoint Security Suite Enterprise is the only endpoint security suite available today that integrates Cylance technology that employs artificial intelligence to protect against the execution of advanced persistent threats and malware including zero day attacks, and targeted attacks such as spear phishing and ransomware.

According to Cylance testing, the new solution offers a significantly higher level of protection, stopping 99 percent of malware and advanced persistent threats, far above the average 50 percent efficacy rating of many traditional anti-virus solutions .

The new Endpoint Security Suite Enterprise is a single solution that simplifies endpoint security and compliance for overburdened IT departments so they can focus on enabling end user mobility and productivity. Key benefits include:

  • No Signatures: The advanced threat protection technology is based on artificial intelligence and dynamic mathematical models with minimal false positives, eliminating the need for constant signature updates.
  • Consolidated Management and Compliance: Endpoint Security Suite Enterprise minimizes the time and resources needed to manage endpoint security by allowing companies to remotely manage all components using a single, non-disruptive console that includes consolidated status and compliance reports. It also satisfies compliance with industry standards, meeting PCI DSS, HIPAA HITECH and Microsoft requirements for anti-virus and anti-malware solutions.
  • Proactive Prevention: Preventing malware significantly reduces remediation costs and employee down time associated with wiping the drive, reimaging the hard disk and reinstalling the operating system and application software.
  • Enhanced Performance and Security: Endpoint Security Suite Enterprise uses a fraction of the system resources, such as CPU or memory, associated with anti-virus and traditional malware solutions. Local detection with no need for a constant cloud connection ensures mobile workers can work where and how they want without worry.
[adrotate group=”1″]

KT Ong, General Manager, Commercial Business, Dell Malaysia
“The growing complexity of BIOS-specific attacks, and with new malware variants possessing the ability to reinstall themselves within the BIOS, organizations need a more sophisticated way to know that their systems have not been compromised. Dell’s unique post-boot BIOS verification technology for its commercial PCs gives IT the assurance that employees’ systems are secure every time they use the device, making them the most secure in the industry.”

Stuart McClure, CEO, Cylance

“The combined Dell and Cylance advanced threat protection capability makes for the world’s most secure computing platforms. Global organizations, through Dell, can now feel confident in their ability to prevent a cyber attack from being successful. Whether an errant email link via a phishing attempt, invisible web site malicious software download or advanced nation-state targeted attack, we can stop them.”

Ray Barth, Manager of Network Operations, Citation Oil & Gas

“The general availability of Dell Data Protection | Endpoint Security Suite Enterprise is a huge advantage for Dell customers. We were looking for an improved approach to endpoint protection and reduction/elimination of the time that support staff has to spend addressing endpoint breaches; we made a strategic decision to replace our legacy server and client software. After implementing Cylance we realized significant benefits in accuracy, visibility, and control. Incidents that have required support staff to put hands on a device have dropped to zero and dormant malware previously undiscovered has been blocked.”

 

Availability

Dell Data Protection | Endpoint Security Suite Enterprise is now available for both Dell commercial PCs and as a security solution across heterogeneous IT environments.

Go Back To > Cybersecurity | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!