Backup and Recovery

Backup and Recovery | News, how-tos, features, reviews, and videos

candle laptop blackout
trouble ahead 166144370

Exclamation point on screen warning alert caution stop

Ways to improve your security team’s response time

Every second counts when it comes to incident response. With proper staffing, a streamlined procedure and the right tools in place, responding to threats can be a far less daunting task.

10 backup archiving

Exploring the paradigm shift from backup to data protection

Smart organizations evaluate their overall data footprint and transform their traditional back office IT to a streamlined data protection approach for both cloud and on-premises data.

Israel Barak
video

Honeypots and the evolution of botnets | Salted Hash Ep 23

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.

group silhouette filled with binary code

SamSam explained: Everything you need to know about this opportunistic group of threat actors

The group behind the SamSam family of ransomware is known for recent attacks on healthcare organizations, but that's not its only target.

customer feedback frustrated man speech bubbles social media

Customers describe the impact of the Allscripts ransomware attack

A ransomware attack against a SaaS provider hurts customers, but when it's a healthcare company that’s hit, patients suffer. Such was the case with January's attack against Allscripts, one of the largest electronic health record and...

allscripts health care ransomware bitcoin

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

The actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned.

security threats and vulnerabilities

Incident management for SMBs

In today's dynamic threat environment, developing a risk management methodology is a strategic imperative for all companies.

ransomware at your service 4

SamSam ransomware attacks have earned nearly $850,000

First emerging in late 2015, the group believed to be responsible for the SamSam ransomware family has targeted small and large businesses, healthcare, governments, and education. To date, the group has made nearly $850,000 USD

salted hash thumbnail final
video

GDPR deadline looms: The price and penalties | Salted Hash Ep 20

With the General Data Protection Regulation (GDPR) deadline fast approaching, host Steve Ragan explores the implications of noncompliance for companies -- and possible penalties -- with Greg Reber, founder/CEO of AsTech Consulting.

salted hash thumbnail final
video

Ransomware: Do you pay the ransom? | Salted Hash Ep 19

Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks.

apc backup

30% off APC 1500VA Compact UPS Battery Backup & Surge Protector

The Back-UPS Pro uninterruptible power supply provides power to your critical devices during an outage, allowing you to continue working or gaming, and stay connected to your network. Ideal for PCs, home office electronics, networking...

7 response

5 trends from 2017 that will still matter in 2018

There were too many lessons to count, so here are 5 things that aren’t going away any time soon.

padlock with circuitry lock in secure

The best kept secret in cybersecurity is protecting U.S. banks against catastrophic attacks

The Sheltered Harbor cybersecurity initiative for U.S. banks and financial services firms protects against hacker attacks.

4 credentials

Credential recovery: disaster recovery for the consumer

The question is, help desk vs. self-service?

shadow it keyboard

The risk of shadow IT to business continuity

We hear about IT systems going down but how much do we think about whether incidents could have been prevented by taking adequate risk mitigation measures?

surge protector

15% off APC 11-Outlet Surge Protector with USB Charging Ports and SurgeArrest - Deal Alert

Be it a lightning strike that destroys a home entertainment center or fluctuating power that degrades the life of your electronics – surges, lightning, and power disturbances can have a devastating impact on the valuable electronics...

rescue recovery data binary sea ocean lifesaver

What you’re doing to protect your data isn’t working

To address the confidence gap that exists between IT and executive leadership, there’s a much-needed dialogue that needs to occur in understanding the current state of IT systems and the impacts those systems have on overall business. ...

trump govt employees twitter

The power of a single insider – lessons from Twitter

A recent Twitter incident should be a great reminder for others on how one single person inside your organization can cause a significant incident with a lot of public exposure.

Load More