Category: News
Five Simple Steps to Better Backups
Skip to main content We might only be a few days removed from World Backup Day 2019, but the idea that 65% of consumers confirmed they suffered data loss (as revealed in our annual survey of attitudes and habits about data protection) has beenTo Defend Infrastructure, Focus First on Obvious Vulnerabilities
Skip to main content This article from James R. Slaby, Acronis’ Director of Cyber Protection, originally appeared in Homeland Security Today on 3 Apr 2019. In 1966, Robert F. Kennedy delivered a speech that cited an ancient Chinese curse:Manage Exchange Online with Ease: Steps and Tips
Administering Exchange Online Exchange Online offers mailbox management, calendaring, and collaboration features. Exchange Online admins can manage Exchange Online either using the graphical user interface or using Windows PowerShell cmdlets andFree masterclass: Writing honeypots
Cymmetria co-founder and CTO, Imri Goldberg, hosts a training session on writing honeypots. This webinar includes concrete techniques and examples, as well as instructions for using the open source honeypot platform, HoneycombHow high-trust industries are benefiting from e-signatures
We often talk about the benefits of e-signatures for businesses. There are some that apply to every organization, such as the cost and efficiency benefits, but there are certain industries that experience more advantages than others from theWhat Businesses Can Learn About the Insider Threat From the NSA Contractor Data Breach
Former US National Security Agency (NSA) contractor, Harold T. Martin III, faces trial this June on charges that he stole an astonishing 50 terabytes of data The huge haul contained documents far more sensitive than anything Edward Snowden madeA Video Surveillance System for the Network – The Top Five Benefits of Network Forensics
It is no surprise that most home alarms are purchased after a break-in has occurred. Unfortunately, most businesses apply the same decision-making process to their own networks. The majority of network security spend is placed on preventativeAttacking the internal network from the public Internet using a browser as a proxy
Though not a new attack, it is not very widely known outside of the security research community that a malicious JavaScript hosted on the public Internet can attack the internal network. Since a browser will by default have access to localhostAbout that information leak: It’s coming from inside the organization
Law firms are often considered a soft target when it comes to data security: one in five law firms was hacked last year and six major law firms were hacked in recent history. Law firms are high value targets because they hold troves of clients’Load More