Skip to content

Cybersecurity: Our Favorite Articles and Tips

cybersecurity

At DriveSavers, we’re experts on cybersecurity. We have to be, considering the petabytes of confidential customer data that flows in and out of our data recovery lab. We frequently share our knowledge of data security and cybersecurity with you through blog articles and white papers. Here are a few of our favorites.

Cybersecurity for Everyone

9 Ways to Secure Your Smartphone

Your smartphone—that mini computer that lives in your pocket—deserves the same protection as your personal laptop or work computer.

Use the guidelines in this article to protect your on-the-go information from hackers and thieves.

Read 9 Ways to Secure Your Smartphone

Internet-connected Children’s Toys: 5 Safety Tips

This is a great one for parents.

Run an online search for “internet-connected children’s toys” and you’ll find pages and pages of “smart” tech toys to purchase, from “learning tablets” designed for young children to funny little animals that transmit voicemail messages, all stored online.

How secure are all of these cloud-storage databases? What might these toys be exposing about you or your children?

This article explores the cybersecurity of internet-connected children’s toys and provides five easy-to-follow tips for keeping your children safe online.

Read Internet-connected Children’s Toys: 5 Safety Tips

Don’t Get Caught by Email Phishing Attacks

A lot of smart people are fooled every day by something that looks genuine, but isn’t! Phishing and malware attacks are designed to take something important from you and profit from the theft. This type of attack is directed at individuals and businesses alike.

This article explains what phishing is and how to protect yourself and your business from phishing attempts.

Read Don’t Get Caught by Email Phishing Attacks

Another Crafty Phishing Attack Example

This spoof email looks to be a locked PDF from the very reputable company, DocuSign. It appears that the receiver of this email is required to click a button to unlock an important file. In actuality, the file is an unlocked PDF with a button that links to a malware site.

This short article explains how to identify this type of phishing email and what to do with it.

Read Another Crafty Phishing Attack Example

Email Security Alert – Messages from Contacts

Here’s another example of a phishing attack that hijacks a real person’s email and uses their contact list for nefarious purposes.

This article explains how to identify this type of phishing email and how to protect yourself.

Read Email Security Alert – Messages from Contacts

Cybersecurity for Government, Corporations, Banks, Medical Practitioners and Small Businesses

Cybersecurity Report: The Overlooked Risk in Third-party Data Recovery

This white paper addresses an often undetected or unattended internal and contractual risk—data recovery—that should never be left out of a strong-layered security practice.

Includes:

  • 2016–2017 data breach statistics
  • Types of sensitive data held by most businesses
  • Costs associated with a data breach
  • Security standards and protocols for data recovery
  • Easy-to-use security vetting checklist

Read Cybersecurity Report: The Overlooked Risk in Third-party Data Recovery

Data Security Compliance: A Cheat Sheet for IT

Whether you work for an organization controlled by compliance standards or you are an independent IT looking to build your enterprise business, industry regulations regarding data security, also known as information security, can sometimes cause a real headache.

This article provides a single set of guidelines to follow that can be applied to all industry regulations at once.

Read Data Security Compliance: A Cheat Sheet for IT

Back To Top
Search