In this in-depth webinar, two experienced IT veterans discuss how to avoid ransomware and what you can do to eradicate it if you get hit.
While phishing, spearphishing, and malicious links are commonly used by hackers here are five other hacking techniques you need to know.
Businesses face all types of pressure in today’s marketplace. One of the most devastating is a data loss event that can destroy a company within seconds. Malware threats are increasing at a dizzying pace, and all types of insider threats are taking the stage as the...
Are OPAC penalties for ransomware payments on the horizon? A statement from the U.S. Treasury suggest so. Find out more…
Insider threat is an area of data protection that is often overlooked. Click through to find out more about the types of insider threat and what you can do about them.
Employees bringing their own devices (BYOD) with them to work force employers to consider mobile security measures and also recognize potential upsides in allowing employees to use personal phones, tablets, and laptops.
Don’t be! A data protection audit has to be thorough but it doesn’t have to be overwhelming. Here is how to prepare for one.
The popularity of TikTok has exploded in recent months. It has quickly become a preferred method of interaction for social media, and people are making money for video views – but is it safe?
Not only must companies protect edge-facing and core-facing infrastructure technologies, they must protect all data at all times, and in all locations.
WastedLocker is a new variant of ransomware developed by a Russian-based company, aptly named Evil Corp – read more about it.