Cloud Backup Success | Online backup

How Secure Cloud Storage Makes Business Better Every Day

Tech shows are a great place to make new connections and find inspiration – and when you hear success stories about your industry and product it’s even more exciting.

At a trade show late last year I was sitting in on a client review and revert session when I heard a success story that really resonated with me about how cloud storage saved someone’s small business. I’d like to share it with you today.

The customer told us how it had taken her several years to build up both the capital and the courage to take her business idea to market. Two years after launching her business she survived a particularly nasty cyberattack that could’ve set her back hugely, – and if she hadn’t had a secure backup of all her files, she probably wouldn’t be in business today.

Here is what she told us and why she believes so firmly that cloud storage solutions are essential for every entrepreneur.

Saved from the clutches of Ransomware

I’ll never forget the day I received that email.

At first, I thought it was a joke or a scam, but when I tried to access my files and found them locked by a ransomware password, I froze on the spot. I was suddenly a “victim of cybercrime” which I had always thought I wasn’t important enough to be.

Like so many victims of the 50% surge in ransomware attacks in SA last year, thoughts of all the sensitive information that we had stored on our company computers raced through my mind as I googled “cyberattack” and tried to desperately call my IT technician.

Our business might still be small but a few hundred customers rely on us to keep their personal information secure and although our remote workers had full access to secure online storage, we had never done a check to ensure they were backing up all the data, daily.

Fortunately, our IT specialist had good news: the online backup package we had purchased just two months before would have a copy of all our important files, and since none of our client information had been compromised, we could safely resolve the issue without paying a cent.

Since that incident, I’ve expanded my cloud storage subscription to include fully encrypted automated backup. The next time a cyberattack takes place, we’ll be ready.

Cloud Backup Success – The benefits go beyond cybersecurity

Cyberattacks aren’t the only reason to sign up for secure cloud storage. A reliable backup solution provides a huge number of benefits:

  • It’s cost-effective. Cloud storage is far cheaper than physical storage and it’s far more difficult for cybercriminals to access it because it’s encrypted.
  • You can scale it to your needs. Whether you’re a one-person business with a one Gb per month requirement or a medium sized enterprise that needs 100 times more storage, you can choose a package that suits your needs and budget.
  • You never have to worry about backing up again. Automated backups mean you’ll always have a recent copy of your files on hand in the event of data loss or a cyberattack.

With cybercrime increasing by the day, every business needs to keep its data safe. Join the ranks of tech-savvy entrepreneurs and browse Soteria’s range of cloud storage solutions today.

Cloud Storage – Store, Sync & Share Backup

Store, Sync and Share Backup Safely with Cloud Storage

Running a modern business means having access to your important company data where and when you need it while still keeping it safe from cybercrime. The headache of relying on physical storage like hard drives and flash drives is over, and cloud storage has become the gold standard for companies that are serious about data security.

Instead of stressing about lost files, either due to physical problems with your hard drive or a data breach, wouldn’t you prefer to rest easy knowing that your files are safely locked away in the cloud?

If you’re new to cloud storage you probably have questions about this technology and how it keeps your data safe. Let’s take a look at some of the benefits of storing your data in the cloud and how you can set your business up with an easy-to-use storage solution.

the benefits of cloud storage

You can share, manage, store, sync and collaborate content with your partners and staff quickly and easily when you choose to backup your data in the cloud, and just as importantly, you can access the data from anywhere.

  • Share data instantly. You can collaborate with your team and give everyone access to the files they need with zero delays.
  • Store business-related content securely. By separating your business and personal files you can only organise your workflow but also keep your private data safe.
  • Sync with all your devices at once. Whether you’re using your iPhone, laptop, tablet or office PC you’ll have access to the same files with secure encryption to keep them out of the wrong hands.
  • Access your data from anywhere. The age of remote working means that you may need to access your files from home, a café, a client’s premises, or even from your hotel room on holiday. All of this is easy with secure cloud storage.
  • Set automated backups. With automated backups happening daily, even if the worst happens you know that your most recent data is all sitting in the cloud. With cloud storage no criminal can hold you to ransom.

access your data safely with cloud storage

A great way to protect yourself from ransomware and malware attacks is to make sure that your data is safe and encrypted at all times.

Our range of secure cloud storage packages allow you to schedule automatic backups and create multiple copies of your files for extra security.

If you have more questions about cloud storage, contact us today and we’ll help you to get started.

Benefits of a functional online backup and restore programme

A world of data types – and one solution to back them all up

Your business uses a lot of different file types – in fact it’s probably impossible to count them all. No matter what category of file you need to back up, a high quality online backup and restore programme will have you covered.

Here are some of the data types you can back up using a system like this:

  • Files
  • Applications
  • Disk images
  • Databases
  • Virtual machines
  • Any other type of data you can think of

backup your data when and how you require

Depending on the amount of data your business creates and how quickly it does so, you may need to back up your sensitive information every week, day, hour, or second.

A good automated backup system will let you select a backup frequency that suits your business to help insure that none of your valuable business information goes missing due to a hardware error or cybercrime attack.

huge files? Seed them on an external HD

One of the main challenges facing the data backup industry in SA is that file sizes are growing rapidly, and internet bandwidth just can’t keep up.

  • If your data connection is too slow to allow for real time backup over the Internet, you’ll need to seed your data.
  • If you’re a Soteria client, this means saving your files to an external hard drive or other storage device and sending them to us by secure courier.
  • Once we receive the device, we transfer your data to the cloud using the same high-security encryption that we applied to data backed up on the Internet.

retention options to suit your company policy

Deciding how long to store your data in the cloud is an important component of every secure backup policy.

A good cloud-based backup solution should offer a range of retention periods, in line with your corporate policy on information storage. This is especially important since the POPI Act was passed earlier this year

The length of time your data will be stored can depend on the number of versions of the same file in the cloud, and retention periods may be applied to single files or entire folders.

high grade encryption

To prevent data breaches, it’s  essential to ensure that your online backup and restore programme uses the best quality encryption possible.

We always recommend military grade encryption technology and upload checks which ensure that the file being backed up reaches the cloud with zero corruption

instant restore for peace of mind

Even in the worst case scenario, lost data shouldn’t remain lost for long.

It’s important that your backed up data can be restored to your computer, a backup server, or a replications server. The ideal restore system will also include backups of all versions of a given file.

how to find an online backup and restore programme?

Not sure where to find such a comprehensive back up system? Look no further

Don’t take unnecessary risks with your company’s data. Our online backup and restore software programme contains cutting edge features that will keep your files safe. Contact us today to learn more.

How to Avoid these 6 Common Cloud Mistakes

Using the cloud to backup your data can significantly benefit your business. But it also presents the risk of making mistakes that could seriously impact your business’s overall security and efficiency. Here’s how you can avoid some of the most common cloud mistakes.

1. don’t assume your cloud data Is automatically protected

Cloud storage alone is not an adequate security measure for your data. Although the company providing the service has to comply with specific security standards, you’re still responsible for securing your own data. The cloud is a goldmine for businesses as well as cybercriminals.

Ensure you encrypt all your data to avoid costly malicious attacks and breaches.

2. don’t underestimate bandwidth and latency needs

You need to evaluate the amount of data you can move (bandwidth) and the delay of moving that data (latency) based on the services you deliver and user expectations. It doesn’t matter how much data you can move if it doesn’t arrive precisely when needed.

High latency can negatively affect cloud-based applications and collaboration tools, impacting productivity and your cloud deployment strategy.

3. establish role-based access

Recognise the vulnerabilities of storing sensitive data in the cloud and take adequate steps to protect it. Role-based security will help you control who can access sensitive data. Not everyone working within the cloud should have access to all the data.

Employees should have an appropriate access level to parts of the cloud according to their role and function. You can also add a two-step authentication process at all access points to ensure no one can access cloud resources maliciously or accidentally.

4. ensure you have an offsite backup copy

Making a copy of your backup manually or implementing a multi-cloud strategy is a practical way of mitigating against disasters or attacks like RansomCloud. A ransomcloud attack targets cloud-based applications and can deny you access to your data.

Having an offsite backup of your essential data will reassure you that you can always access or restore the data if a hacker locks up or encrypts the data in the cloud. You’ll also maintain access to your information should there ever be a cloud downtime or poor internet connection.

5. continuous education and training

It’s vitally important to have updated training and education resources for yourself and employees of all levels. This ensures everyone knows how to identify, avoid, and report phishing schemes. Encouraging vigilance can help detect phishing attacks before they become a problem.

RansomCloud attackers will use phishing emails to access emails, impersonate account owners, launch scams, and spread malware. Such emails often look legitimate and can trick victims into clicking files that can corrupt entire systems or provide unauthorised access.

6. have a cloud service level agreement in place

Before you buy or build a new house, you would insist on a blueprint from the architect. Building your backup in the cloud is no different – insist on a blueprint! Besides reading the fine print, it’s essential to ensure you have a cloud Service Level Agreement (SLA) in place with the service provider.

In much the same way, an SLA serves as a blueprint and warranty for cloud computing. It provides written service expectations between cloud consumers and providers. Ensure you evaluate the SLA for details on;

  • Security standards and system infrastructure to be maintained by the service provider.
  • Your rights to audit the service providers’ compliance.
  • Affirmations on ownership of the data stored in the service providers’ system and your right to get it back.
  • The specific parameters and minimum levels needed for each service element and the remedies in place in case of failures to meet such requirements.

common cloud mistakes are, common!

Challenges and mistakes can come from many fronts. It’s therefore vital that you perform your due diligence, expect the unexpected, and plan for exceptions from the start.

Have you ever experienced cloud-based security issues? Share your story with us today!

Is the latest iPhone iOS update worth your time?

With iOS 14.5 now available, the question begs to be asked; is the new update really worth your time, and if it is, what exactly has changed or improved?

Digital giants are constantly releasing software updates for their devices, some small and relatively insignificant while other updates have a significant impact on the performance of the app or the device.

The new update comes alongside iPadOS 14.5 and WatchOS 7.4. That means it offers the Apple Watch unlock feature and App Tracking Transparency. Some say that the new features were designed to appeal to a world in the midst of a pandemic and, of course, to those worried about what happens to their data and their money in a world of digital payments.

So should you get the new iPhone iOS update? Without a doubt!

The new update comes hand-in-hand with iPadOS 14.5 and WatchOS 7.4. That means it offers the Apple Watch unlock feature and App Tracking Transparency. Some say that the new features were designed to appeal to a world in the midst of a pandemic and, of course, to those worried about what happens to their data.

ios 14.5 update #1: apple watch unlock

Apple watch unlock is for people on the move who want to comply with COVID-19 regulations (i.e., wear a mask at all times in public). As Apple devices have progressed over the years, the fingerprint ID feature is no longer. Now, Apple devices work purely on facial recognition, and you know what that means? It means you have to remove your mask to unlock your phone.

The new iOS 14.5 update enables users to unlock their mobile devices using their Apple Watch, eliminating the mask issue. Of course, you need to have an Apple Watch, and it must be running the Watch OS 7.4 version.

You can set up this feature in the following way:

  • On your mobile device, open settings.
  • Select “Face ID” and then “Passcode.”
  • Look for the toggle labelled “Unlock with Apple Watch” and select it.

Now you can unlock and relock your iPhone using your Apple Watch.

ios 14.5 update #2: app tracking transparency

This feature is for those worried about the safety of their personal data when using online services and applications.

By now, you’re aware that the apps you use (yes, including social media apps) track your user activity and data. The app tracking transparency feature requires these apps to ask your permission to do so. When you’re on a social media app, you will receive an alert asking if you want to allow the app to track your activity across other services and applications. You can switch off app tracking altogether or go to “Privacy” on your device settings and select which apps you want to disallow and allow monitoring.

additional features of ios 14.5 update

There are, of course, other features included in the iOS 14.5 update that aims to make the user experience more enjoyable and convenient. These include improvements to Siri, updates to the Podcast app, a selection of fun new emojis, Apple News updates, and various bug fixes that make the software run smoothly.

last word

If you want to take our word for it then the iOS 14.5 update is definitely worth your time, particularly if you want to ensure that you’re following COVID-19 regulations and keeping your personal data safe and secure. Download it today when you do your next online backup!

South Africans see an increase in online shopping scams

So, while scrolling through your social media news feed you happen to ‘stumble’ across a coveted item on your must-have list – at a considerably discounted price. The discount persuades you and you take all the necessary steps to visit the supplier website, make the purchase and sit back to await it’s arrival…except the delivery will never take place.

The supplier hasn’t hit a hitch with a shoddy courier company, but rather doesn’t exist! You, yes YOU, have been scammed.

That sickening feeling you just experienced picturing yourself as the victim of an online shopping scam is the feeling hundreds, if not thousands of South Africans have recently faced and still will face in the weeks and months to come of 2021. Sadly, the truth of the matter is, South Africans are seeing a steady increase in online shopping scams.

markdown marvin takes south africans for a ride

One particular scamster company called “Markdown Marvin” has recently been in the spotlight for selling high-end televisions and Playstations at hugely discounted rates online. The products were never delivered and after several people suffered the same plight, attention was drawn to the issue through FNB. Markdown Marvin had been using FNB as their bank of choice to collect their illegal takings.

As the details of the scam came to light at FNB, the bank jumped into action to investigate the matter. Unfortunately, as with many similar frauds, the funds could not be returned to the victims as the money had already been removed from the account.

how to protect yourself against online shopping scams

So, how do you protect yourself from falling for a scam of this nature? Experts will tell you to ensure that you only purchase from well-known stores with a solid, existing reputation. However, this kind of advice is a tad unfair to new e-commerce businesses that are decent and legitimate.

There are a few other ways that you can safeguard yourself

  • Confirm with the banking institution that the account holder name is in fact the same as the business/supplier name. For instance, FNB offers the “Verify Owner” option on their online banking app.
  • Scrutinise the legitimacy of the online store in question. Does the store have a telephone number and address where you can reach someone for assistance? While not all stores that conceal their details are scams, those with transparency are a better option.
  • When making an online payment, the store should redirect you to confirm your transaction via your bank’s 3D secure page or via your bank’s mobile app. If the online store doesn’t do this, you should be wary and cancel the transaction.
  • Do online research on the company. Look for reviews and scam reports online. For instance, if you would like to see if Markdown Marvin is a legitimate store, you can Google “Markdown Marvin scam” or “reviews on Markdown Marvin” or even “is Markdown Marvin a scam?”. You will either come across a host of negative posts or positive ones – you can be the judge of them.
  • If you do make a payment and then start to worry that the online store is a scam, reverse the payment as soon as possible. Don’t give the scammer enough time to remove your money from their account.

Lastly, if you have been the victim of an online shopping scam, it is imperative that you report the scam as soon as possible. If you have the banking details of the scammer, contact their bank and advise them of the fraudulent activity too.

Start off 2021 on a more aware, alert and online shopping cautious note. Be safe online – shop safe! Be wise – plan regular backups of your data.

A look at the Protection of PI Act (PoPI Act)

For a while, it looked as though South Africa would lag behind the rest of the world when it came to personal information protection laws, but suddenly, all of that has changed.

The South African Constitution declares that everyone has the right to privacy, and South Africa is now taking the use and storage of personal information seriously with laws to protect the average person on the street, as well as the high-flying business owner from a possible data breach.

President Cyril Ramaphosa has stepped up and proclaimed that certain essential sections of the POPI Act will come into effect as of 1 July 2020. The PoPI (Protection of Personal Information Act) has been sufficiently updated and while it will be effective as of 1 July, there is a 12-month grace compliance period.

What the Updated PoPI Act Means for the SA Business Owner

South African businesses will have 12 months to ensure that they make adjustments to their business operations, so that they are compliant with the PoPI Act, although it is recommended that they should attempt to comply as soon as possible. The changes to the various sections and the implementation of new sections to the Act means that you will have to take a close look at how you deal with your customer’s and employee’s personal data and information. You will need to put protective measures in place to ensure that data is never put at risk.

The updated Act seeks to ensure that businesses process personal information legally and respond to their duties and responsibilities as entities handling sensitive information.

The updated PoPI Act states that businesses should have a dedicated Information Officer (not necessarily a full-time employee of the company) to ensure business-wide compliance. Businesses that don’t comply within the lengthy time-frame given to reach compliance will be faced with hefty penalties for breaking the law.

What the Updated PoPI Act Means for the South African Consumer

Once the Act was amended, it was published that the following sections had been updated:

  • Sections 2 to 38
  • Sections 55 to 109
  • Section 111
  • Section 114 (1), (2), (3)

While all of these sections have been changed, it is largely section 5 that affects the South African consumer the most as it deals with how the information of individuals is gathered and processed. The rights expanded on in the Act mean that you as a consumer have the right to:

  • Receive notifications when your information is being collected.
  • Receive notifications if your data is intercepted or accessed by an unauthorised third party.
  • Query if a party has your personal information.
  • Request a copy of your stored or captured information from a party.
  • Request that your personal information is corrected or deleted by a party.
  • Deny the processing of your personal information in certain situations.
  • Refuse to have your personal data processed for the purpose of direct marketing.
  • Not be subject to a decision on outcomes that are only based on the information provided by an automated system.
  • Submit official complains to regulators pertaining to non-compliance of the Act.
  • Action civil proceedings against parties that interfere with the protection of your personal information.

Whether you are a business owner or a consumer in South Africa, the amended PoPI Act has been designed to protect your rights as well as personal data. By working together (and that means being compliant with the updated Act), data in South Africa can be handled safely and securely.

If you want to start getting your business compliant with the new PoPI Act, you can start by signing up for a data encrypted online backup service. Ensuring that the sensitive data on your business devices is kept safe and sound is a step in the right direction.

Back to Basics of Backing Up: How to Choose the Right File Sync & Backup

2020 saw the whole work-from-home concept flourish. It’s not that people are starting up their own businesses from home, but rather that businesses are realising the value in having home-based and remote workers. Not only does this make for a happier workforce, but it also seems to boost productivity. Of course, with the convenience of home working comes a plethora of threats, data loss potential, and vulnerabilities open to opportunistic cybercriminals.

The work-from-home professional has a lot to worry about! Hard drive failure, ransomware, natural disaster (flooding or fires), human error – you name it! The only true way to protect your data, your business, and your employees is to get back to basics – backing up! By choosing a good file sync and backup service, you can minimise the potential for ultimate data demise.

What is the Best Backup Solution?

When it comes to backing up data, there are a few options to choose from. One is that of backing up to an external hard drive and another is to opt for an online backup service. The problem with external hard drives is that they can malfunction, you could lose the device (or it may get stolen), or you could fall victim to a natural disaster.

For these reasons, we believe that online encrypted data backup services are the best possible data protection solution.
What’s great about an online backup service is that the files are all encrypted for security reasons. In addition to that, the uploaded files can be accessed and restored at any time and from anywhere – as long as you have an internet connection and your username and password on hand.

Is Encrypted Backup the Same as Cloud Storage?

The simple way to answer this question is, ‘no’.  A file syncing and cloud storage service is a service such as Dropbox, Google Drive and even OneDrive. These services will store files in the cloud, but they don’t offer document protection.

The Cost of the Right Backup Service

One of the first things that business owners worry about is the cost involved in a cloud backup service. Because the right backup service doesn’t usually come for free, they think that opting for a free cloud backup service is the answer…when, in reality, it is only a temporary solution and will eventually lead to complications and even more costs.

All cloud storage and backup service providers offer packages that have different account features. These rates usually fluctuate depending on the security offered, the number of devices linked to the account, and of course, how much storage space will be used.

Free accounts do offer storage capabilities, but when it comes to document protection, it’s quite limited. Free cloud backup plans also come with storage space limits and restricted key features. These features are typically essential to a professional business. You might also find that the files are difficult to upload, or the size of the files that can be uploaded at once are limited. This can be quite inconvenient. When you run out of space, you will typically be offered the option to upgrade to a paid account.

The Convenience of the Right Cloud Backup Service

When shopping around for a good backup service, you will likely pay special attention to the data encryption offered – and that’s good – but what about the convenience? Imagine going to the expense of equipping all of your employees with professional backup systems on their devices, which they then forget to make use of! That’s a waste of money and a risk for your business.

With a decent backup service, you should be provided with software that is quick and easy to download and activate. You should then be able to set the software to carry out an automated backup on certain days of the week and at specified times. This means that you and your employees never have to remember to do a backup – the system will do it for you.

Because the data is stored in the cloud and encrypted, there’s no need to store sensitive information on employee devices and if something does happen to the device or if there’s a case of human error with an accidental delete, there’s nothing to worry about as it’s all there, safely stored in the cloud.

The Security of the Right Cloud Backup Service

There are many cloud backup services available, but not all of them are equal. Consider a backup service that offers data encryption as this means that not even your employees can access documents that are saved to the cloud and locked. Absolute peace of mind is yours. You will be given a private encryption key required to unlock your documents and you can use a password manager to store this for you.

Features of the Backup Service

One of the most important features to look for in a data backup service, and second only to encryption, is that of the restoring of files. Restoring and recovering files should be quick and easy. If it’s not, you are wasting valuable time and money. Make sure that your chosen system has an effective file search feature and that it also has the ability to recreate and restore entire folder tree structures – which is what you will require if you need to recover from a big data breach or loss.

The Performance of a Backup Service

Another important feature to keep your eye out for is – speed. You don’t want a backup service that is extremely slow. You need a service that can encrypt, compress, and upload files to the service quickly, especially if you need to upload a lot of data or a lot of large files. Pay attention to the minim speeds offered and ensure that you chat to the service provider about your particular size and amount of data.

In Conclusion…

Choosing the right backup service at the right price can seem daunting, but have you considered the risks and costs of going another day without it? The more your workforce works from home and the more freedom you give your staff to work from home, the greater the risk of data loss and breach is to your business. Protect your business, yourself, and staff – choose the right data backup service today.

Traffic Fine Platform Data Leak Exposes Many

After the 2017 Master Deeds breach exposed the details of some 60 000 local South African’s, you would think that those in control of sensitive data on such a large scale would be more careful. It seems however, that not everyone learned their lesson.

If you were outraged to hear just how easy it is for data to fall into the wrong hands then, prepare to be even more shocked when you learn about the latest data leak in SA where 934 000 citizens were affected.

The Breach

The data breach originated from an electronic traffic fine platform. The sensitive information, which was stored in a public web folder and then made publicly accessible, was discovered by Troy Hunt who is a security researcher.

If you have ever signed up to a platform that provides traffic fine alerts, chances are high that your data could be included in this leak. Regardless of whether or not you were affected, if you have paid a fine online you should take the time to change your password. The data exposed and made accessible to the public included the following:

  • ID numbers
  • Email addresses
  • Plain text passwords (no encryption!)

Industry professionals say that because the data is publicly available, it could well be a case of negligence when it comes to safety of data. With the new legislation in place and cyber security laws, this could mean serious trouble for the traffic fines data base.

Authorities Have been Notified

Authorities need to be notified when sensitive information is accessed and in this instance the NPA Cybercrime Unit, the Hawks and various other authorities were informed.

What you Can do to Protect Yourself

It always comes a shock when personal and account information is leaked and you find that you are on the list of victims. It is important to be aware of what you share and how you share it. Only make use of reputable online services that have quality security in place. Change your passwords regularly and ensure that you back up and encrypt sensitive information to the cloud.

Want to better protect your private data? Chat to with us at Soteria Cloud today.

I’m selling my computer – How do I wipe the hard drive before I sell it?

We often talk about doing online backups to ensure that you don’t lose files in the event of a computer malfunctioning or going missing, but what if you are choosing to sell your laptop or computer? Many people who are upgrading to a better system will want to make some cash selling their older unit and this can be done, but first, consider the data that you have been storing on it over the years.

Before you start any “cleaning” of the contents on the machine, we recommend doing an online encrypted backup. Once that is done, you’re ready to begin deleting/wiping!

I’m selling my computer, can I simply delete my files and empty the recycle bin?

You might think that deleting all your files and then emptying the recycle bin is enough, but it isn’t. Not everyone that buys a second hand PC or laptop has good intentions.

If you happen to be the unlucky one who sells their machine to an opportunistic criminal, a lot of your sensitive data could be at risk. A cybercriminal will know just how to recover your files and all that sensitive information that could lead to identity theft and online fraud.

Now that my data is backed up online, what do I do?

Once you are satisfied that all of your treasured images, music, documents and files are stored by doing an online cloud backup, with a reputable service provider such as Soteria, take the following steps (these apply to Windows 7 users – Mac users should follow the steps here):

  • Remove all your programs: you will have undoubtedly installed licensed programs that you wish to continue using. You should always keep all original installation discs in a safe place so that you can use them on your new machine. Some software providers have instructions on how to transfer the program and license to a new machine. Visit their websites and follow their instructions on how to reinstall the software on your new PC or laptop.
  • Uninstall: It’s then time to remove any remaining programs from your machine. Go to the “Control Panel” / “Programs” and then click on “Uninstall a Program”. Now you can remove all the programs that you don’t want the new user to have access to.
  • Permanently delete: to speed up the process, it’s a good idea to move all your files from the pictures, documents, music, and all other folders into the recycle bin and empty it. This won’t be the last step. Unfortunately, apps and programs recycled on a computer can be fairly easy to recover. Download the Eraser Tool software here. Once it is downloaded and installed on your computer, open the program and select all the files that need to be deleted and click “delete”. This will permanently remove these files from the machine.
  • Clear your history: make sure that you remove your browsing history, cookies, saved passwords and auto form fill history from your device. Before you do this, visit all your regular sites and social media platforms such as Facebook, email, Twitter etc. Make sure that the “automatically sign me in” option is deselected and that you are signed out of each account. Now you can delete all history. You can do this by going to the “Control Panel” and clicking on “Internet Options”. Then select “Clear History” and make sure all the relevant options are selected.

After all this is done, you are ready to hand your computer over to the new owner with complete peace of mind that your deleted files and data will not be recovered. Of course, you will still have full access to your data, thanks to the convenience of online backup!