• NO Processing Fee, No Diagnosis Fee, NO Data No Charge
30 Nov

Cloud back up services in Kenya

Cloud back up services in Kenya

Are you looking for Cloud back up services in Kenya  or Cloud Back up Solution in Kenya ? By definition cloud backup is defined as a strategy of sending any copy of a virtual file or a physical or database to a secondary storage, all this is done to an off-site location that will help preserve in the event of an equipment failure or even a catastrophe. This is done in mind to protect data.

To explain a little bit more, this offsite location having the copy of the virtual file or the physical file which has all the database is stored to a secondary storage known as the cloud.  The process of restoring all the data through cloud computing of any information that was created, edited, managed is done remotely over the internet.

Do you know disaster can’t be planned and can strike any time?  A good example is when there is a malware attacks, ransomware attacks, system failure, power outage, floods, fire or even terrorist attacks denying your organization to access data and causes loss of the same data. If you’re organization has  subscribed to our cloud backup services, they will be able to recover their lost data the moment all the restoration functionality is activated which will rollback copies of  the files and the stored data to preferred latest choice of a valid backup performed earlier through a stable internet connection remotely.

At East African Data Handlers  depending on the type of data you have, you can select the optimal type of backup that is needed for your business; we heavily focus on any core business operations with our cost-effective, automated, reliable data storage and backup solution services that are powered by a Tier 3 data center.

To entice you more, we make sure that our data backup solution covers all and is not limited to only files and folders, backup network drives, MySQL databases, Microsoft exchange, Microsoft SQL Outlook Mail and Microsoft SQL.

Our 3 Approach to backup is either;

  • Differential backup
  • Full backup
  • Incremental backup

On a liter note, East African Data Handlers Cloud backup features are best designed in mind to have minimal intervention from our staff support as the dashboard is easy to manage hence save support cost.

Best Features for Cloud Backup Services

  • You Set it and no need to forget it: Our backup agent will do the backup process automatically the way you set your scheduled and submit accurate reports to your emails.
  • Secure and highly data encrypted End to end solution; We make sure your data is safely encrypted both during its motion and even at storage rest.
  • Compatibility merits with any Platform: Our backup agent is cross platform-independent. It can support Windows or Linux environments. You have less worries
  • Speed during deployment and data restoration: Our restoration process gets your systems in minutes to start running as a quick data recovery process. This helps to minimize the cost of downtime.
  • Surveillance is assured to be 24/7 monitoring services: Our team of experts work tireless to monitor all processes while enforcing data safety, it’s integrity and security.
  • After Sale Services and a Dedicated support system: Anytime you need disaster recovery needs done, you can count on us.

Why East African Data Handlers Cloud Back up Services?

  • It’s Safe
  • Fast
  • Simple  and Easy Scheduling Process
  • Quick and Simple Restore Process
  • Can support Group Policy

We Support : personal cloud backup, online backup comparison, , cloud backup solutions for small business, best cloud backup for mac, enterprise cloud backup and do sos online backup.

GET A QUOTE NOW:  Call +254 711 051 000

Share this
19 Nov

Kenya Data recovery

Kenya Data Recovery

What is Data recovery?

Kenya Data Recovery plays a big role in Kenya business industry to help companies resolve data disaster occurence. So, do you understand what it means to do data recovery?  Do you have lost data or have data files that are corrupted ? Are you looking for Data recovery  experts? Do you have raid drives and and  in urgent need of raid recovery?

Are you stranded looking for a reliable Data Recovery Experts company in Kenya, Dar es Salaam Tanzania , Kampala Uganda and  Kigali Rwanda? Do you know we also do  Data recovery Sudan

In computing, data recovery is a process of salvaging (retrieving) inaccessible, lost, formatted or corrupted data from secondary storage, data files or removable media, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid- state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystem, and other electronic devices.

Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevent it from being mounted by the most operating system (OS).

The most common data recovery scenario involves an operating system failure, malfunction of a storage devices, accidental damage or deletion, etc. (typically, on a single-drive, single-partition, single-OS system), in which case the ultimate goal is simply to copy all important files from the damaged to another new drive. This can be easily accomplished using a live CD or DVD by booting directly from a ROM instead of the corrupted drive in question.

Many live CDs or DVDs provide a means to mount the system drive and backup drives or removable media, and to move the files from the system drive to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigate by disk partitioning and consistently storing valuable data files (or copies of them) on different partition from replaceable OS system files.

Another scenario involves a drive-level failure, such as a compromised file system or drive partition, or a hard disk drive failure. In any of these cases, the data is not easily read from the media devices.

Depending on the situation, solutions involve repairing the logical file system, partition or the master boot record, or updating the firmware or drive recovery techniques ranging from software-based recovery or corrupted data, hardware and software-based recovery of damaged service areas (also known as hard disk drives “firmware”), to hardware replacement on a physically damaged drive which allow for extraction of data files to a new drive. If a drive recovery is necessary, the drive itself has typically failed permanently, and the focus is rather on a one time recovery, salvaging whatever data can be read.

The term “data recovery” is also used in the context of forensic applications, where data which has been encrypted or hidden, rather than damaged, are recovered. Sometimes data files present in the computer get encrypted or hidden due to reasons like virus attack which only be recovered by computer forensic experts.

Are you in Nairobi Kenya and Looking for recovery process by best Data Recovery Experts for services likeraid recovery,photo recovery, recovery kenya laptop recovery file recovery or have Storage media (storage devices )like flash drives , hard drive ( hard disk drives) and need to recover the data files call now East African Data Handlers.

Causes of Data loss in Kenya.

  • power loss.
  • Human error.
  • Logical or hardware failure.
  • Natural disaster
  • Viruses.

 

Evaluation.

At East Africa Data Handlers LTD, we carry out an evaluation before doing any recovery of the Data Loss and give a comprehensive diagnostic report of what we feel can be recovered. This helps the clients to make an informed decision when giving a go ahead for the Data Recovery process.

What to do when experiencing RAID Data Loss.

At East Africa Data Handlers LTD, we carry out an evaluation before doing any recovery of the RAID system and give a comprehensive diagnostic report of what we feel can be recovered. This helps.

Our Services

We are proud to provide you with full Data Recovery Service coverage to any part of Kenya; NairobiMombasaKisumu, Eldoret. Data Loss is only temporary and we prove it every day with the highest Hard Drive Recovery Success rate in Kenya. We Recover Data in Kenya from the Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

East African Data Handlers ltd no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Contact us now

If you’ve lost valuable, irreplaceable data — We can save it! Call us now at 0711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands

 

Share this
05 Nov

Data Recovery Kampala, Uganda Service

Data Recovery Kampala, Uganda Service

Do you know before you dump the storage drive we probably can still save it for you?

Are you looking for Data Recovery Kampala, Uganda Service ? East African Data Handlers Ltd- Has the most successful data recovery rate in Africa as one of the best company.

Our reach

Have you Lost your Data? Are you in Uganda (Kampala, Nansana, Kira, Makindye/Ssabagabo, Mukono, Mbarara, Mukono, Gulu, Lugazi, Masaka, Kasese, Hoima, Lira, Mityana, Mubende, Masindi, Mbale, Jinja, Kitgum, Entebbe, Njeru ) and in any Country of East Africa. East African Data Handlers have you covered ,we are skilled in doing data recovery for all types of storage device;
Hard Drives,
Network-Attached Storage (NAS),
Flash Drives and Solid State Drives
Mobile Phones,
Laptops,
SAS and SCSI Hard Drives,
Desktops,
Memory Cards,
Raid Systems,
Storage Area Network (SAN),
Tapes, Servers,
SAS and SCSI Hard Drives,

East African Data Handlers Ltd is among world leader in data recovery services.

We have a team of the  most educated and skilled engineers with knowledge of advanced  tools used in Data recovery and have the highest level of expertise to recover data from any storage media exist in the world.

As a result, we have the highest success rate having a full recovery in the industry. You Can follow us

At East African Data Handlers Ltd – In our Data Recovery labs, we guarantee no -destructive data recovery services to your devices in using our  methods of recovery  hence you get your drive in the same condition it was received.

Our Policy of Charging:

-We offer

1) Free Evaluation on Data Recovery Service. : The fees are determined by

-the drive’s logical problem or physical  damage ,

-the time/expertise needed and the nature of the failure.

Please be assured our attempt is simple and cost-effective approaches before getting into the more involved procedures.

Hence we are Proud to offer you our services at Kampala

Data Recovery Kampala, Uganda 

Our Guarantee

East African Data Handlers ltd  Follows no data – no charge policy meaning  you owe us nothing if we are unable to recover your critical files. We understand that no Data is Lost and our team of engineers know how to retrieve it back. Our network reach in the whole of East Africa.  Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

Call 0711 051 000.

Share this
31 Oct

RAID Recovery in Kenya

RAID Recovery in Kenya

Are you looking for Raid Recovery in Uganda,  Raid Recovery in Kenya, Raid Recovery in Tanzania, Raid Recovery in Rwanda  do not struggle  East African Data Handlers we Recovers all types of corrupted RAID arrays.

Allow our Team of Experts to Recover data from corrupted RAID arrays with sophisticated tools. Our tools automatically detect the type of original RAID array that you have during RAID Recovery while allowing for fully manual operation.

Our RAID Recovery engineering team recover from all types of RAID arrays, whether hardware or software.

We Reconstruct all types of arrays just as easily as a single hard disk. Our Team of Experts know and can recognizes all imaginable configurations of various types of arrays, including RAID 0, 1, 0+1, 1+0, 1E, RAID 4, RAID 5, 50, 5EE, 5R, RAID 6, 60 and JBOD, no matter whether they are connected to a RAID server, a dedicated RAID controller or a RAID-enabled motherboard from NVidia®, Intel®, or VIA®.

Apple®, Linux® (NAS), Microsof® software RAIDs (also called Dynamic Disks) are also supported, including JBOD (span), RAID 0, 1, and 5 configurations, QNAP RAID, mdamd RAID. Product works with Adaptec®, HP®, Dell®, MegaRAID®, Silicon® RAID Controllers and DDF compatible devices. ZFS with RAIDZ are also supported. RAID Recovery™ works only under Windows but restores RAID that is running Mac OS, Unix, etc.

Step one is to detect the right type of an array

Our Team ensure they do this for vital and correct recovery process to start. They study the DiskInternals during the RAID Recovery process both manual and with the use of our fully automatic detection tools for essential parameters such as a type of array, type of RAID controller, stripe size, and disk order.

Step two is to assemble RAID configurations manually

We assemble RAID configurations manually via a simple drag-and-drop operation. Our Raid Recovery Tools re-constructs any array from the available hard disks and detects the right type and size or the array as well as the order of the disks automatically.

Special technical skills are required during this process to recover broken RAID arrays.

Our RAID Recovery Team gives our customers the best and top of the art method of Raid Data Recovery as a way to ensure all the data is recovered and the integrity maintained.

Be at peace knowing that our RAID Recovery method use advanced search algorithms to allow recovering important files such as documents, pictures, and multimedia even if there is a missing disk in the array, or if the file system is missing or damaged.

So if you are Located in Uganda we offer Uganda Raid Data Recovery.

Our stretch

 

East African Data Handlers ltd  Follows no data – no charge policy meaning  you owe us nothing if we are unable to recover your critical files. We understand that no Data is Lost and our team of engineers know how to retrieve it back. Our network reach in the whole of East Africa.  Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

Call 0711 051 000.

Share this
08 May

Surge of MegaCortex Ransomware attacks detected

Surge of MegaCortex Ransomware attacks detected

A new strain named MegaCortex.

A cyber-security firm in the UK has reported detecting a spike in ransomware attacks at the end of last week from a new strain named MegaCortex. The firm said the MegaCortex ransomware appears to have been designed to target large enterprise networks as part of carefully planned targeted intrusions – a tactic that is known as “big-game hunting.” The modus operandi is not new and has been the preferred method of delivering ransomware for almost half a year.

MegaCortex now joins an ever-growing list of ransomware strains that cyber-criminal groups are using only in targeted attacks, rather than with spam or other mass deployment techniques. The list includes some recognizable names, such as Ryuk, Bitpaymer, Dharma, SamSam, LockerGoga, and Matrix.

SUDDEN RISE OF ATTACKS THIS MONTH.

According to a report released late Friday night 3rd May 2019, MegaCortex was first spotted back in late January, when someone uploaded a sample on malware scanning service VirusTotal.

Since then, the number of attacks has been growing, but they spiked mid last week when the firm says it detected 47 attacks – accounting for two-thirds of all the 76 MegaCortex attacks the company has seen all year.

The firm says it blocked the attacks it detected, which originated from enterprise networks located in the United States, Canada, the Netherlands, Ireland, Italy, and France. However, other megacortex attacks might have occurred in other places where the UK antivirus vendor had no coverage.

 

 

Share this
15 May

Facebook Messenger Spam and scam is targeting its victims via a video link malware

Facebook Messenger Spam & Scam Spreading Malicious Chrome Extensions, Adware

Beware Facebook Messenger users, as cybercriminals are targeting victims by spreading malware through links sent by their friends.

The malware campaign was discovered by David Jacoby, a senior security researcher in the global research and analysis team at Kaspersky Lab, who was himself targeted after a Facebook friend with whom he rarely interacts, sent a link to a purported video file in Messenger.

After just a few minutes analyzing the message, I understood that I was just peeking at the top of this iceberg. This malware was spreading via Facebook Messenger, serving multi platform malware/adware, using tons of domains to prevent tracking, and earning clicks,” David said.

So, how does this malware spread? Apparently, the malicious message containing a bit.ly or t.cn link and the name of the user plus the word “Video” arrives through one of your friends account on Messenger to make the potential victims believe that it is a legitimate video link. When the victim clicks on the link, it will take the user to a Google Docs page that has a screenshot photo of that Facebook friend. The message is made to look like a playable movie.

But when clicked on that video, the victim is redirected to external sites depending on their browser, location and operating system that ultimately attempt to lure them into installing the malware. This malicious software, if downloaded, will cause the victim to spread the virus to their contacts on Facebook Messenger.

By doing this, it basically moves your browser through a set of websites and, using tracking cookies, monitors your activity, displays certain ads for you and even, in some cases, social engineers you to click on links,” Jacoby writes.

 

facebook_messenger_malware

For example, a Google Chrome user is redirected to a fake YouTube page with a fake error message designed to push the user in downloading a malicious Chrome extension.

Meanwhile, on Firefox, the users get directed to a website displaying a fake Flash Update notice, which attempts to run a Windows executable to deliver the adware. Since this malware is cross-platform, it affects MacOS Safari too and offers the download of a .dmg file, which is also adware.

It is unclear how the malware spreads via Messenger.

The initial spreading mechanism seems to be Facebook Messenger, but how it actually spreads via Messenger is still unknown. It may be from stolen credentials, hijacked browsers or clickjacking,” David speculated.

The people behind this are most likely making a lot of money in ads and getting access to a lot of Facebook accounts,” said David.

We know that clicking on unknown links is not recommended, but through this technique they basically force you to do so.

Please make sure that you don’t click on these links, and please update your antivirus!,” added David.

When ZDNet got in touch with Facebook regarding the matter, a spokesperson for the social media giant said: “We maintain a number of automated systems to help stop harmful links and files from appearing on Facebook.

“If we suspect your computer is infected with malware, we will provide you with a free antivirus scan from our trusted partners. We share tips on how to stay secure and links to these scanners on facebook.com/help.

Source: ZDNet

Share this
17 Oct

Should you leave your smartphone plugged into the charger overnight? We asked an expert

 

 

 

 

 

 

 

 

chargingaphone

Should you leave your smartphone plugged into the charger overnight?

It’s an issue that has plagued humanity since the dawn of the mobile phone. We use our trusty pocket computers so much that they rarely get through a day with any power left. Many of us plug them in at night and fall asleep, content in the knowledge that we’ll wake up to a fully charged device.

But is it really safe to leave our phones plugged into the charger once they’re fully charged? Is it damaging the battery — or shortening its lifespan?

There are lots of myths and questionable ideas on this topic. You’ll find the Internet awash with opinions masquerading as facts. What’s the truth? We’ve got some answers for you.

Should you leave your phone plugged into the charger overnight?

“Leaving your phone plugged in overnight is okay to do, it will not drastically harm your device,” says Shane Broesky, co-founder of Farbe Technik, a company that makes charging accessories. “Your phone is very smart. Once it’s fully charged, it knows when to stop the current from coming in to protect your phone from overcharging.”

Eventually the battery is going to noticeably degrade.

So far so good, but there are situations when leaving that smartphone plugged in overnight can slowly reduce the lifespan of your battery.

“Lithium-ion batteries can react poorly if your phone experiences elevated temperatures, leading to a damaging effect,” explains Shane. “If you have a case on your device that does not allow heat to escape, this heat will increase the temperature of the battery and will cause cell oxidation, which will shrink the capacity and shorten the lifespan.”

Make sure you take your phone case off at night if you’re going to leave your phone plugged in and charging, in other words.

What’s the optimum way to charge your phone?

“The sweet spot for lithium-ion batteries is to keep them charged between 50 and 80 percent. This allows for the charged ions to continue to work and protect the life of your battery,” says Shane. “Charging your device in short spurts throughout the day will give these ions just enough energy to keep them going.”

So frequent top-ups, rather than one daily charge up, is healthier for your battery. It’s not convenient, but that’s the optimal way to charge your smartphone if you want to ensure the longest life possible.

What to avoid

“The major threat to your battery is charge cycles,” Shane explains. “A charge cycle is where your battery goes from empty or near-empty to full — and every phone battery has a limited number of charge cycles before the end of its life.”

leaving-your-phone-charging-2

Denys Prykhodov/Shutterstock

You may have a high number of charge cycles before that limit is reached, but eventually the battery is going to noticeably degrade. When it does, you’ll find that it lasts only a very short amount of time, or it will simply not turn on at all.

“Try to avoid going from 0 to 100 percent whenever possible, this will start to break down your battery and give your device a shorter lifespan.” Shane suggests.

Use quality accessories

There’s one other factor to consider when charging your smartphone and it concerns the quality of the accessories you use. It’s always best to use the charger and cable that shipped with your smartphone. Failing that, you can buy another official charger and cable.

Cheap counterfeits are not built with safety in mind and can be very dangerous.

Sometimes official chargers and cables are eye-wateringly expensive. But you can find reputable alternatives. Manufacturers like Farbe Technik produce safe accessories that are fully tested, certified by the likes of Apple and Samsung, and compliant with legislation. If you are going to buy a charger from a third-party just make sure to stick to big brand names.

It’s also important to ensure that the charger and cable you buy has the correct rating. Cross-check the amp or watt rating with your phone’s specifications.

 

The real risks are found at the cheap end of the market. Cheap counterfeits are not built with safety in mind and can be very dangerous. They often don’t meet safety standards. The London Fire Brigade released a report last year warning about the dangers of electrocution, burns, and even house fires after a number of incidents caused by counterfeit iPhone chargers. The report also offers some advice on how to spot fakes.

Quick recap

You can leave your phone plugged into the charger overnight without too much risk, provided it’s not a counterfeit charger, and you don’t let your phone overheat. For best results with your smartphone charging, here’s what to remember:

  • Always use official chargers and cables, or certified alternatives from reputable brands and retailers.
  • Don’t let your phone get too hot. Remove the case when charging overnight.
  • For the longest battery life possible, try to keep your battery between 50 and 80 percent.
  • Avoid letting phone battery completely discharge, and don’t charge it from 0 percent up to 100 percent too often.

 

Courtesy of  DIGITRENDS

Contact us now

If you’ve lost valuable, irreplaceable mobile data   or need Data Recovery Plan for your Oraganisation or business— We can save it! Call us now at +254 711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands, Kenya. Best of it, we have distributed offices all over East Africa and can easily get your device brought to us from anywhere in East Africa.

Also  we have other services in data recovery for various  devices; Hard Drives, Laptops, Desktops, Raid SystemsRAID / NAS / SAN , Servers, Memory Cards, Flash Drives, Databases, SSD Drives etc

East African Data Handlers ltd  no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Share this
13 Oct
15 Aug

9 Ways to Lose Your Data

9 Ways to Lose Your Data

Every time I hear this , “Hey the database is almost crashing – and please we can’t have our data lost or the downtime affected,” I just smile and shake my head because to a layman  honestly,  technology is seriously difficult.

Ok to illustrate, here’s a collection of client stories i happen to get from the internet

1) The DBCC CHECKDB job ran every week just like it was supposed to – but it failed due to corruption every week. No one got email alerts because the SQL Agent mail was no longer valid – internal email server changes meant the mail was just piling up in SQL Server. CHECKDB had been failing for three years, longer than the backups were kept. Data was permanently lost.
2)  The DBA configured his backups to write to a file share. The sysadmins never understood they were supposed to back up that file share. When the DBA asked for a restore, he was surprised to find there were no backups.
3) Three SQL Servers were all replicating data to each other. When I asked the DBA where the backups were run, he looked at one server, then another, then the third. He sheepishly admitted – in front of his manager – that there were no backups done anywhere.
4) The DBA set up full backups daily, plus log backups of all databases in full recovery mode. Later, she put a few databases into simple recovery mode in order to fix an issue. She forgot to put them back into full recovery mode. When problems struck and she needed to recover a database, she lost all data back to the prior full backup.
5) The SQL Server ran out of space on the C drive. During emergency troubleshooting, someone deleted a bunch of BAK files. The server started up, but databases were offline and corrupt. Turned out the user databases were on the C drive, as were all of the backups – the very backups that were just deleted to free up space.
6) The DBA started getting odd corruption errors on one of his servers, then more, and quickly all of them. The SAN admin had flashed the storage with new firmware – which had a bug. The DBA was writing his backups to that same SAN, and sure enough, some of the corrupt databases had corrupt backups too.
7) The admin wanted to restore the production databases onto another server. He tried, but it kept saying the files were in use. He stopped the SQL Server service, deleted the files, started it again, and finally his restore worked – but his phone lit up. Turned out he’d remote desk topped into the wrong server – he was on production.
8) The developer did a deployment on Friday afternoon, tested it, and went home. However, the deployment had an UPDATE script that wrote invalid data to a percentage of the rows in a critical table. Over the weekend, people worked in that table, putting in valid data and changing some invalid data. On Monday, by the time the team figured out what had happened, the data in the table was a total mess – with real valuable data that shouldn’t be restored over.
9) The team built a complex Always Availability Groups infrastructure for really reliable databases, and full backups every night, and log backups every 4 hours. When someone accidentally issued a delete statement, that delete was instantly replicated across to the other replica. They could still recover back to a point in time – but it meant serious downtime for the AG since you can’t restore databases in an AG. While they debated what to do, more valid data went into their production database – meaning they could no longer simply do a point-in-time restore.

Each of these teams thought their data was safe.

They were wrong.

Kendra says: OK, I’ve got to admit it– I’ve been part of teams where we’ve fallen victim to more than one of these scenarios. And I work on teams with smart people! This can happen to you, look at these stories and your own environment slowly and carefully.

So if you are like me, a little precaution when it comes to saving your data is important: Things you must have on your phone record:

  • Disaster Data Rescue team ( You can count on us East African Data handlers )
  • Capital for Data recovery services ( This is like an insurance to safeguard your data )
Share this

© 2015  East African Data Handlers. All rights reserved.