Chat with us, powered by LiveChat Our Insights Into Data Recovery, Cybersecurity, Digital Forensics | Proven Data


Back To School? Back To Cybersecurity Basics

Back To School? Back To Cybersecurity Basics

Every year as Labor Day moves near, students, teachers & faculty alike prepare to return to the daily routine of school sessions around the country. Educational institutions of all sizes continue to use technology and online resources to help provide more learning materials and modernize classroom functions. Now more than ever, students & teachers are more connected to the digitized world, and as such, they must ensure better cyber hygiene and proactively keep their data & information safe. With […]

Schools Are Becoming Targets for Ransomware Attacks By Proven Data Team Uncategorized

Schools Are Becoming Targets for Ransomware Attacks

In late July, Governor John Bel Edwards of Louisiana declared a State of Emergency citing “there has been severe, intentional cybersecurity breaches in Louisiana school systems that may potentially compromise other private and public entities throughout the State”. The announcement followed a series of cyber attacks against three major school districts in the state, generating panic and fear amongst the educational community around the nation. Ransomware attacks further victimized school districts in Connecticut, Alabama, New Mexico, amongst a growing […]

New York State Passes SHIELD Act and Expands Breach Notification Laws

New York State Passes SHIELD Act and Expands Breach Notification Laws

The New York State Assembly passed the SHIELD (Stop Hacks and Improve Electronic Data Security Act) which is positioned to enforce a new legal framework for businesses when protecting personally identifiable data. 

The Empire State moves one step closer to adopting the SHIELD Act, a law aimed to hold businesses accountable for the safeguard of their client’s data across the State of New York. This new bill is critically important for the organizations and enterprises that conduct business in NY […]

Sodinokibi Ransomware Begins to Exploit Previous Windows Zero-Day

Sodinokibi Ransomware Begins to Exploit Previous Windows Zero-Day

Reports point to Sodinokibi ransomware for using exploits from a previous Microsoft Windows zero-day vulnerability.

In the Spring of 2019, a new ransomware variant dubbed Sodinokibi (also known as REvil, Sodi, Sodin) started infecting computers with malware, encrypting user data and demanding a ransom in the form of Bitcoin. Sodinokibi first began by capitalizing on an Oracle WebLogic deserialization vulnerability in which allowed remote code execution over a network without the need for proper authentication such as usernames and passwords. […]

DHS Warns of Incoming Iranian Wiper Attacks

The Department of Homeland Security (DHS) is warning government agencies and US industries to stay aware of incoming Wiper Attacks from Iran.

Beware of Wiper Attacks

DHS Press Release

In a press release from the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), Director Christopher C. Krebs warned the public of “a recent rise in malicious cyber activity directed at the United States”, indicating potential cyber attacks against government agencies and businesses from Iranian regime actors. Krebs addresses the […]

GandCrab Ransomware Cyber Criminal Organization Announces Leave from Extortion ‘Business’

Since first emerging in January of 2018, the GandCrab ransomware variants have affected more than 1.5 million users of the Windows Operating System, and the cyber criminal organization claiming they received more than $2 billion in ransomware extortion payments. 

In June of 2019, the organization behind the infamous ransomware GandCrab announced in an online forum that they are ceasing operations and will not be providing any further decryptions and variants. First released on January 28, 2018, GandCrab ransomware is considered […]

Proven Data Ransomware compliance

Our History of Ransomware & Compliance

Proven Data has been and will continue to be a pioneer in the ransomware remediation and recurrence prevention. Ransomware is a type of malware that locks up files and demands payment usually in the form of bitcoin. The files are not unlocked until a key is obtained from the threat actor after making payment.

Ransomware continues to be a major threat affecting organizations and their networks of all sizes, and Proven Data stands by our clients with the intent […]

Mergers & Acquisitions: Necessity of Cyber Diligence

Mergers & Acquisitions: Necessity of Cyber Diligence

In June of 2019, Quest Diagnostics revealed they had experienced a major data breach that exposed medical records of almost 12 million people worldwide. As one of the largest clinical laboratory testing operations in the world (with locations in the United Kingdom, India, Brazil, and Mexico), the medical testing firm announced that a third-party billing contractor, American Medical Collection Agency (AMCA), was the main point of access for an unauthorized user to access sensitive patient data and information. This […]

Cybersecurity Tips for Small Businesses (2019 National Small Business Week)

In conjunction with the U.S. Small Business Administration, Proven Data is celebrating National Small Business Week 2019! Small businesses are the backbone of the US economy, and according to the U.S. Small Business Administration’s Office of Advocacy, 2018 saw a growth of 1.9 million new jobs of this business size. Like every other company entering the digital age, small businesses heavily rely on technology to acquire new customers and store their digital records.   

Small businesses play such an important […]

World Password Day 2019

Today marks World Password Day 2019! Businesses and consumers around the globe are celebrating today by helping share awareness and resources to benefit internet users and improve their password security. Although some reports are calling for the end of passwords in the future, we believe these security tools will be around for a much longer time, and as such, everyone must treat their password security like the keys to their own home.

A major problem plaguing many unsuspecting users is […]