What are OFAC fines and what will they mean for any companies tempted to pay ransom payments to malicious cyber entities?
Employees bringing their own devices (BYOD) with them to work force employers to consider mobile security measures and also recognize potential upsides in allowing employees to use personal phones, tablets, and laptops.
Don’t be! A data protection audit has to be thorough but it doesn’t have to be overwhelming. Here is how to prepare for one.
The popularity of TikTok has exploded in recent months. It has quickly become a preferred method of interaction for social media, and people are making money for video views – but is it safe?
Not only must companies protect edge-facing and core-facing infrastructure technologies, they must protect all data at all times, and in all locations.
WastedLocker is a new variant of ransomware developed by a Russian-based company, aptly named Evil Corp – read more about it.
Next Level Backup ProtectionPhysical and logical security are two important factors when considering backup files. Modern restore capabilities allow for entire virtual machines and systems to be brought back online from a backup very quickly, assuming that a...
Right now, the most popular phishing email subject line is “COVID-19 payment.” Why would your employees NOT click on that? What can you do?
Hackers are using coronavirus to exploit people’s desire to investigate the worrisome nature of this new threat by burying malicious code in seemingly harmless Covid-19 incidence maps.
Backup and security go hand-in-hand Russia, the United States and many points in between have been hit by what's now a common form of cybercrime. Ed Wallace, MWR Infosecurity: Ransomwares become a tool of choice for all sorts of criminals simply because it's very,...