Disaster Recovery

Disaster Recovery news, analysis, research, how-to, opinion, and video.

st louis federal reserve bank
healthcare security hp

amtrak derailment

Business continuity and disaster recovery planning: The basics

Good business continuity plans will keep your company up and running through interruptions of any kind: power failures, IT system crashes, natural disasters, supply chain problems and more.

american justice courtroom gavel legal system law justice flag 000000804982

Law firm says human error to blame for client breaches in 2014

The Privacy and Data Protection team at BakerHostetler, a law firm with offices across the U.S, has released a report stating that human error was responsible for the majority of the security incident cases they worked in 2014.

keyboard chinese flag china hacker

Penn State disables network after attack, says China is to blame

The Penn State College of Engineering took their network offline on Friday, after being targeted by what the school is calling two "sophisticated" cyber attacks. The university engaged FireEye to help with incident response, and...

cracks in wall

SAFETY Act liability shield starts showing cracks

This week, Salted Hash has examined the Department of Homeland Security's (DHS) SAFETY Act, and FireEye's promise to customers that their certification under the act provides them protection from lawsuits or claims alleging that the...

security protection defending shield soldier battle warrior

FireEye offers new details on customer liability shields under the SAFETY Act

On Friday, Salted Hash explored the announcement from FireEye that their customers now have a liability shield due to being certified by the Department of Homeland Security (DHS) under the SAFETY Act. Now the company has released...

security protection defending shield soldier battle warrior

FireEye customers get liability shield thanks to SAFETY Act

Last week, the Department of Homeland Security (DHS) certified FireEye under the SAFETY Act, providing their customers protection from lawsuits or claims alleging that the products failed to prevent an act of cyber-terrorism.

tesla supercharger station tesla model s resized

Tesla attack started with a single phone call

Last weekend, Tesla Motors had their website, and Twitter accounts hijacked by individuals looking to play a joke. They used their access to deface the company's website and spam a computer repair shop in Illinois, posting their...

teenagers taking pizza slices at restaurant 78742347

Pizza restaurant targeted for supporting Indiana's 'religious freedom' law

They were the first restaurant owners in Indiana to come out in support of Indiana's controversial "religious freedom" bill, signed into law last week by Governor Mike Pence. However, the O'Connor family and their business, Memories...

tech catastrophes

Tech apocalypse! 9 doomsday scenarios

Far-reaching fallout awaits us at the littlest hack or glitch, thanks to our increasing reliance on hyperadvanced computing and vast communication networks

godaddy license
Special Report

GoDaddy accounts vulnerable to social engineering and Photoshop

GoDaddy serves more than 13 million customers, who in turn place 59 million domains under the registrar's management. On Tuesday, my personal account at GoDaddy was compromised. The attacker was able to gain control over my account...

Detail view of organized medical files    87333166

Anthem accused of avoiding further embarrassment by refusing audit

Anthem Inc., the nation's second largest health insurer, has refused a request for an IT Security audit citing corporate policy. This is the second time the organization has refused an audit request from the Office of Personnel...

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Anthem: 78.8 million affected, FBI close to naming suspect

On Tuesday, Anthem, the nation's second largest health insurer, said that 8.8 to 18.8 million people who were not customers could be impacted by their recent data breach, which at last count is presumed to affect some 78.8 million...

disaster recovery button keyboard

When backup Is a disaster

Utility Company AMP overhauls a mishmash of backup and recovery procedures to create one coherent plan.

Lenovo Y50 gaming laptop

Lenovo says Superfish problems are theoretical, but that simply isn't the case

On Thursday, the world woke to the news that commercial-grade Lenovo PCs were being shipped from the factory with adware pre-installed on the system. Designed to provide a visual shopping experience, the software is insecure and...

insurance dictionary

CISOs cut out of cyber-insurance decision making, study suggests

Most large enterprises in the UK still aren't managing risk through dedicated cyber-insurance policies and the few that do buy based on recommendations by legal rather than IT departments, an analysis by non-profit the Corporate...

01 checklist

7 critical things to cover in your disaster-recovery plan

As always, you never know when a disaster will strike, so better to have a checklist on hand so that panic doesn’t set in when the network goes down.

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Anthem confirms data breach, but full extent remains unknown

Anthem, the nation's second largest health insurance provider, confirmed that outsiders were able to compromise an unknown number of records, including complete profiles for individuals.

serverskulls header

Criminals holding compromised websites for ransom

According to a report form High-Tech Bridge, criminals have started moving away from Ransomware, which targets a single PC, to a process the security firm is calling RansomWeb – where the criminal encrypts the website's databases and...

Load More