What are the main types of backup operations and how can you avoid the sinking feeling of realizing that you may not get your data back? As humanity’s use of all kinds of technology has grown, terms like backup are no longer unfamiliar to the majority of people. Of course, the concept of a backup … More Types of backup and five backup mistakes to avoid
World Backup Day is a reminder that organizations and individuals need to make data backup and protection a priority. The loss of data – whether a result of human error, technological failure, or a cyberattack – is one of the greatest threats to organizations and individuals today. In our increasingly digitized world, we rely on our … More World Backup Day: Is your data in safe hands?
Some tips that businesses can do to get better at it without breaking the bank. Here at RSA Small and Medium Businesses (SMBs) are squarely faced with the daunting task of securing the explosion of IoT devices, now ever-present in the business environment. In the past, IoT in a business setting could largely be ignored, but that’s no … More RSA – IoT security meets SMB
Time does fly! It feels like only yesterday that a new strain of hitherto little-known malware achieved celebrity status among global ransomware campaigns. It’s already been a year, almost to the day, since the WannaCryptor ransomware cryptoworm – also known as WannaCry and detected by ESET as Win32/Filecoder.WannaCryptor.D – ran rampant. What made WannaCryptor’s impact so severe, … More 12 months on, what are the lessons learned from WannaCryptor?
When it comes to storing a company’s confidential information and/or backing it up, various questions tend to come up with regards to the location where this storage will take place. Some companies choose to manage everything for themselves, providing remote access so their employees can look it up whenever they need it. Others, however, have … More Is it safe to store corporate information on Google Drive (or similar services)?
As mentioned in a previous blog post, ESET detects and blocks the WannaCryptor.D threat and its variants. ESET currently detects ransomware behavior as FileCoder, and all ESET products provide multiple layers of technologies to protect computers from this infection. Take these steps now We strongly recommend using the following best practices for enhanced security. 1. Keep … More Best practices to protect against the WannaCry ransomware
Technology has changed the way we live, our relationships with others, and even how we take care of ourselves. These days, everyone – from the most inexperienced to the most advanced user – takes measures to protect themselves from cybercriminals seeking to compromise or steal information. In this article, we discuss how you can fend … More 10 ways to ruin a cybercriminal’s day