Skip to content

ITProPortal: Data Security Compliance—A Cheatsheet for IT

Originally published by ITProPortal. By Michael Hall, Chief Information Security Officer (CISO) at DriveSavers Keep reading for a single set of guidelines to follow that can be applied to all industry regulations at once. From HIPAA to SOX, whether you work for an organization controlled by compliance standards or you are…

CIOL: Is Pokémon Go IT’s new BYOD Monster?

Originally published by CIOL. By Pratima H Anything which gets insanely popular tends to get everybody’s attention – including the guys who make malware. What about fellas who are supposed to gate-keep malware? CA, USA: Meteoric – the word – finally gets the right place to describe something really befitting. It’s…

CSO Online: 4 Signs You’re a Victim of Ransomware

Originally published by CSO Online. …and the 3 steps you need to take next By Amy Bennet The word ransomware conjures images of kidnappers and ransom notes. But that doesn’t quite capture the reality of PC ransomware. In fact, “it’s not always obvious when ransomware is the problem,” says Mike Cobb,…

Symptoms of Ransomware Infection

By Mike Cobb, Director of Engineering Ransomware is a quickly growing problem. There were nearly 2,500 cases of ransomware reported to the FBI’s Internet Crime Complaint Center (IC3) in 2015 alone, and victims paid over 1.6 million dollars to unlock their data. 2016 is shaping up to show even larger…

12 Tips for a Stronger Password

By Michael Hall, Chief Information Security Officer Weak passwords are an easy way for someone to access your personal data. Use proper password techniques that are enforced for all user accounts, including those with remote access to your system. Here are some good tips to follow when creating passwords: Passwords…

Proposed Encryption Legislation and What it Means

By Scott Moyer, DriveSavers President Unless you are just this moment rejoining society after months spent stranded on a technology-free desert island, you are well aware of the recent controversial disagreement between the FBI and Apple involving an iPhone 5C that once belonged to San Bernardino shooter, Syed Rizwan Farook.…

Protect Your Android Phone from App Attacks

If you use an Android phone, please take this advice­—now For your protection, never buy apps from any discount sellers and always use a malware or security scanner to weed out problems with software before an infection can occur, according to a new report from G Data Security Labs. For…

Bluewater International Adds DriveSavers Data Recovery

Bluewater International, a leader in corporate growth management, is pleased to announce the addition of DriveSavers Data Recovery, the worldwide leader in data recovery services, to its “Impact Investment” portfolio of elite clients and strategic partners addressing areas of societal concern surrounding, cyber security, information integrity and privacy. Bluewater International,…

Learn About the Five Top Internet Security Threats in 2012

RSA: Five Top Internet Security Threats in 2012 by Jacqueline Emigh Cybercriminals will keep pursuing consumers, businesses and government agencies, but other Internet security violators in 2012 will range from teen “hacktivists” to “Big Data companies,” foreign governments, and corporate employees, said security experts on hand at the RSA Conference in…

Back To Top
Search