Are OPAC penalties for ransomware payments on the horizon? A statement from the U.S. Treasury suggest so. Find out more…
Insider threat is an area of data protection that is often overlooked. Click through to find out more about the types of insider threat and what you can do about them.
Employees bringing their own devices (BYOD) with them to work force employers to consider mobile security measures and also recognize potential upsides in allowing employees to use personal phones, tablets, and laptops.
Don’t be! A data protection audit has to be thorough but it doesn’t have to be overwhelming. Here is how to prepare for one.
The popularity of TikTok has exploded in recent months. It has quickly become a preferred method of interaction for social media, and people are making money for video views – but is it safe?
Not only must companies protect edge-facing and core-facing infrastructure technologies, they must protect all data at all times, and in all locations.
WastedLocker is a new variant of ransomware developed by a Russian-based company, aptly named Evil Corp – read more about it.
Physical and logical security are two important factors when considering backup files. Modern restore capabilities allow for entire virtual machines and systems to be brought back online from a backup very quickly, assuming that a local/on-premises version is...
Right now, the most popular phishing email subject line is “COVID-19 payment.” Why would your employees NOT click on that? What can you do?
Hackers are using coronavirus to exploit people’s desire to investigate the worrisome nature of this new threat by burying malicious code in seemingly harmless Covid-19 incidence maps.