Big Sur is the latest operating system (OS) from Apple, and users are loving it!…
At DriveSavers, we’re experts on cybersecurity. We have to be, considering the petabytes of confidential customer data that flows in and out of our data recovery lab. We frequently share our knowledge of data security and cybersecurity with you through blog articles and white papers. Here are a few of our favorites.
Cybersecurity for Everyone
Your smartphone—that mini computer that lives in your pocket—deserves the same protection as your personal laptop or work computer.
Use the guidelines in this article to protect your on-the-go information from hackers and thieves.
This is a great one for parents.
Run an online search for “internet-connected children’s toys” and you’ll find pages and pages of “smart” tech toys to purchase, from “learning tablets” designed for young children to funny little animals that transmit voicemail messages, all stored online.
How secure are all of these cloud-storage databases? What might these toys be exposing about you or your children?
This article explores the cybersecurity of internet-connected children’s toys and provides five easy-to-follow tips for keeping your children safe online.
A lot of smart people are fooled every day by something that looks genuine, but isn’t! Phishing and malware attacks are designed to take something important from you and profit from the theft. This type of attack is directed at individuals and businesses alike.
This article explains what phishing is and how to protect yourself and your business from phishing attempts.
This spoof email looks to be a locked PDF from the very reputable company, DocuSign. It appears that the receiver of this email is required to click a button to unlock an important file. In actuality, the file is an unlocked PDF with a button that links to a malware site.
This short article explains how to identify this type of phishing email and what to do with it.
Here’s another example of a phishing attack that hijacks a real person’s email and uses their contact list for nefarious purposes.
This article explains how to identify this type of phishing email and how to protect yourself.
Cybersecurity for Government, Corporations, Banks, Medical Practitioners and Small Businesses
This white paper addresses an often undetected or unattended internal and contractual risk—data recovery—that should never be left out of a strong-layered security practice.
- 2016–2017 data breach statistics
- Types of sensitive data held by most businesses
- Costs associated with a data breach
- Security standards and protocols for data recovery
- Easy-to-use security vetting checklist
Whether you work for an organization controlled by compliance standards or you are an independent IT looking to build your enterprise business, industry regulations regarding data security, also known as information security, can sometimes cause a real headache.
This article provides a single set of guidelines to follow that can be applied to all industry regulations at once.